Which of the following is considered the MOST effective practice when securing printers or scanners in an enterprise environment?
A. Routine vulnerability scanning of peripherals
B. Install in a hardened network segment
C. Turn off the power to the peripherals at night
D. Enable print sharing only from workstations
Answer: A. Routine vulnerability scanning of peripherals
Computer Science & Information Technology
You might also like to view...
What does the text pane of a SmartArt graphic offer?
A) A location where you can type text B) A place where you can change the font and font size C) A location where you can change the color of typed text D) A place where you can insert an object
Computer Science & Information Technology
Use of an incorrect formula to produce a desired result is a type of __________ error.
Fill in the blank(s) with correct word
Computer Science & Information Technology