Which of the following is a best practice when securing a switch from physical access?
A. Disable unnecessary accounts
B. Print baseline configuration
C. Enable access lists
D. Disable unused ports
Answer: D. Disable unused ports
You might also like to view...
Represent a signal f = [3 , 1 , 5 , ? 2 , 1] T defined on graph G, shown in Figure 9.1, as a linear combination of the eigenvectors of the graph Laplacian.
What will be an ideal response?
Which of the following statements is not true about indexes?
A) They are commonly suggested by the Performance Analyzer tool. B) They improve performance. C) They should be added to every field. D) They should be added to fields which are searched or sorted often.
_____ are the files that form a database of all the current virus signatures used by the antivirus software for malware detection.
A. Windows Firewall B. ?Definitions C. Windows Defender D. Protections
Running the Disk Defragmenter utility will ________.
A. detect and remove spyware B. mark bad memory cells C. make the hard drive work more efficiently D. clean out your Startup folder