Which of the following is a fundamental security rule and best practice?

a. Change MAC addresses
b. Disable IP address sharing and port sharing
c. Configure the default gateway so packets are sent to the next hop
d. Disable any unused switch ports


d. Disable any unused switch ports

Computer Science & Information Technology

You might also like to view...

Use only the keyboard to answer the following:

On the keyboard alone emacs has always offered a full set of editing possi- bilities. Generally several techniques will accomplish the same goal for any editing task. In the X environment the choice is enlarged still further with a new group of mouse-oriented visual alternatives. From these options you must select the way that you like to solve a given editing puzzle best. Consider this Shakespearean fragment: 1. Full fathom five thy father lies; 2. Of his bones are coral made; 3. Those are pearls that were his eyes: 4. Nothing of him that doth fade, 5. But doth suffer a sea-change 6. Into something rich and strange. 7. Sea-nymphs hourly ring his knell: 8. Ding-dong. 9. Hark! now I hear them-- 10. Ding-dong, bell! The following fragment has been typed with some errors: 1. Full fathiom five tyy father lies; 2. These are pearls that were his eyes: 3. Of his bones are coral made; 4. Nothin of him that doth fade, 5. But doth susffer a sea-change 6. Into something rich and strange. 7. Sea-nymphs hourly ring his knell: 8. Ding=dong. 9. Hard! now I hear them-- 10. Ding-dong, bell! a. How many ways can you think of to move the cursor to the spelling errors? b. Once the cursor is on or near the errors, how many ways can you think of to fix them? c. Are there ways to fix errors without explicitly navigating to or searching for them? How many can you think of? d. Lines 2 and 3 in the retyped material are transposed. How many ways can you think of to correct this situation?

Computer Science & Information Technology

The AIFF sound file format is primarily used on UNIX workstations.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Social bookmarking sites are sometimes called social recipe sites, as recipes tend to be among the most bookmarked and shared items

Indicate whether the statement is true or false

Computer Science & Information Technology

Which formula is used to calculate the number of hosts per network or subnet? Use n to repre sent the number of bits

a. (2^n – 1) b. 2^n c. (2^n – 2) d. (n – 2)

Computer Science & Information Technology