A company discovers an unauthorized device accessing network resources through one of many network drops in a common area used by visitors. The company decides that is wants to quickly prevent unauthorized devices from accessing the network but policy prevents the company from making changes on every connecting client. Which of the following should the company implement?

A. Port security
B. WPA2
C. Mandatory Access Control
D. Network Intrusion Prevention


Answer: A. Port security

Computer Science & Information Technology

You might also like to view...

If you want to send e-mail messages to the same group of people several times, you can save time by creating a ____.

A. distribution set B. contact group C. spam filter D. macro list

Computer Science & Information Technology

____ was designed by IBM in the 1970s and is the most widely used symmetric cipher.

A. RC4 B. RC5 C. DES D. AES

Computer Science & Information Technology

Which of the following configurations of a wireless network would be considered MOST secure?

A. WEP using MAC Filtering B. WEP and hiding the SSID C. WPA2 D. WPA TKIP and hiding the SSID

Computer Science & Information Technology

When an object is rotated, it turns around its

a. View point b. Center point c. Middle point d. Rotation point e. None of these

Computer Science & Information Technology