A small company can only afford to buy an all-in-one wireless router/switch. The company has 3 wireless BYOD users and 2 web servers without wireless access. Which of the following should the company configure to protect the servers from the user devices?
A. Deny incoming connections to the outside router interface.
B. Change the default HTTP port
C. Implement EAP-TLS to establish mutual authentication
D. Disable the physical switch ports
E. Create a server VLAN
F. Create an ACL to access the server
Answer:
E. Create a server VLAN
F. Create an ACL to access the server
You might also like to view...
The ________ statement acts like a chain of if statements. Each performs its test, one after the other, until one of them is found to be true or until the construct is exited without any test ever evaluating to true.
A) if/then B) if/else C) if/else if D) if/not if E) if/end if
Which of the following is the method you can use to determine whether a file exists?
a. the File class's canOpen method b. the Scanner class's exists method c. the File class's exists method d. the PrintWriter class's fileExists method
Where would you normally expect to find such a statement? What if that statement appeared in a different part of the program?
A program contains the statement throw; What will be an ideal response?
How can I change the security group membership for interfaces owned by other AWS, such as Elastic Load Balancing?
A. By using the service specific console or API\\CLI commands B. None of these C. Using Amazon EC2 API/CLI D. using all these methods