A BYOD policy in which employees are able to access the wireless guest network is in effect in an organization. Some users however are using the Ethernet port in personal laptops to the wired network. Which of the following could an administrator use to ensure that unauthorized devices are not allowed to access the wired network?

A. VLAN access rules configured to reject packets originating from unauthorized devices
B. Router access lists configured to block the IP addresses of unauthorized devices
C. Firewall rules configured to block the MAC addresses of unauthorized devices
D. Port security configured shut down the port when unauthorized devices connect


Answer: D. Port security configured shut down the port when unauthorized devices connect

Computer Science & Information Technology

You might also like to view...

The U.S. Patriot Act specifically deals with cyberterrorism

Indicate whether the statement is true or false.

Computer Science & Information Technology

____ effects create dark or light edges around images, creating a circular frame that is used to draw the viewer’s eyes to an object of focus located near the center of the frame.

a. Reframing b. Circular framing c. Vignette d. Offsetting

Computer Science & Information Technology

A junior administrator is having issues connecting to a router's console port using a TIA/EIA 568B standard cable and a USB serial to RJ-45 adapter, despite verifying terminal settings. What is the issue?

a. Router console ports are only used when connected to other routers. b. The router console port is providing an Ethernet connection, instead of a serial connection. c. The USB standard is incompatible with the serial connection used by the console port. d. The cable must be a rollover cable.

Computer Science & Information Technology

A(n) ____________________ object includes a text box that allows the user to enter text, and a list box that displays a list of items from which the user can select one.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology