While configuring a new access layer switch, the administrator, Joe, was advised that he needed to make sure that only devices authorized to access the network would be permitted to login and utilize resources. Which of the following should the administrator implement to ensure this happens?

A. Log Analysis
B. VLAN Management
C. Network separation
D. 802.1x


Answer: D. 802.1x

Computer Science & Information Technology

You might also like to view...

Consider the class

``` class Value { private T v; public Value(T v1) { v = v1; } public void output() { System.out.println(v); } } ``` The code Value nV1 = new Value(34.5); A) will cause a compiler error B) will compile correctly, but cause an exception at run time C) will compile and run correctly D) None of the above

Computer Science & Information Technology

As part of the initiation and planning audit phase, it is customary for a(n) ____ to be developed, which serves as a service agreement between the auditing team and the requesting entity.

A. contingency plan B. incident report C. engagement letter D. change request

Computer Science & Information Technology

To protect a worksheet, you click Format in the ________ group

A) Workbook B) Worksheet C) Editing D) Cells

Computer Science & Information Technology

A ____ pane is a pane, like a windowpane, that opens on the right or left side of the program window.

A. task B. command C. menu D. status

Computer Science & Information Technology