Joe noticed that there is a larger than normal account of network on the printer VLAN of his organization, causing users to have to wait a long time for a print job. Upon investigation Joe discovers that printers were ordered and added to the network without his knowledge. Which of the following will reduce the risk of this occurring again in the future?

A. Log analysis
B. Loop protection
C. Access control list
D. Rule-based management


Answer: D. Rule-based management

Computer Science & Information Technology

You might also like to view...

Describe the properties of a server.

What will be an ideal response?

Computer Science & Information Technology

A location in the computer’s memory that may contain different values at various times throughout the execution of a program is called a __________.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Where does Excel display the Total row in a table?

A) Two rows below the last row in the table B) After each subtotal in the table C) At the top of the table D) Below the last row in the table

Computer Science & Information Technology

A primary key is usually given the abbreviation _pk in the constraint name if the name is assigned by the user.?

Indicate whether the statement is true or false.

Computer Science & Information Technology