A BYOD policy in which employees are able to access the wireless guest network is in effect in an organization. Some users however are using the Ethernet port in personal laptops to the wired network. Which of the following could an administrator use to ensure that unauthorized devices are not allowed to access the wired network?
A. VLAN access rules configured to reject packets originating from unauthorized devices
B. Router access lists configured to block the IP addresses of unauthorized devices
C. Firewall rules configured to block the MAC addresses of unauthorized devices
D. Port security configured shut down the port when unauthorized devices connect
Answer: D. Port security configured shut down the port when unauthorized devices connect
You might also like to view...
The U.S. Patriot Act specifically deals with cyberterrorism
Indicate whether the statement is true or false.
____ effects create dark or light edges around images, creating a circular frame that is used to draw the viewer’s eyes to an object of focus located near the center of the frame.
a. Reframing b. Circular framing c. Vignette d. Offsetting
A junior administrator is having issues connecting to a router's console port using a TIA/EIA 568B standard cable and a USB serial to RJ-45 adapter, despite verifying terminal settings. What is the issue?
a. Router console ports are only used when connected to other routers. b. The router console port is providing an Ethernet connection, instead of a serial connection. c. The USB standard is incompatible with the serial connection used by the console port. d. The cable must be a rollover cable.
A(n) ____________________ object includes a text box that allows the user to enter text, and a list box that displays a list of items from which the user can select one.
Fill in the blank(s) with the appropriate word(s).