Which of the following is a best practice when securing a switch from physical access?

A. Disable unnecessary accounts
B. Print baseline configuration
C. Enable access lists
D. Disable unused ports


Answer: D. Disable unused ports

Computer Science & Information Technology

You might also like to view...

Represent a signal f = [3 , 1 , 5 , ? 2 , 1] T defined on graph G, shown in Figure 9.1, as a linear combination of the eigenvectors of the graph Laplacian.

What will be an ideal response?

Computer Science & Information Technology

Which of the following statements is not true about indexes?

A) They are commonly suggested by the Performance Analyzer tool. B) They improve performance. C) They should be added to every field. D) They should be added to fields which are searched or sorted often.

Computer Science & Information Technology

_____ are the files that form a database of all the current virus signatures used by the antivirus software for malware detection.

A. Windows Firewall B. ?Definitions C. Windows Defender D. Protections

Computer Science & Information Technology

Running the Disk Defragmenter utility will ________.

A. detect and remove spyware B. mark bad memory cells C. make the hard drive work more efficiently D. clean out your Startup folder

Computer Science & Information Technology