Which of the following is considered the MOST effective practice when securing printers or scanners in an enterprise environment?

A. Routine vulnerability scanning of peripherals
B. Install in a hardened network segment
C. Turn off the power to the peripherals at night
D. Enable print sharing only from workstations

Answer: A. Routine vulnerability scanning of peripherals

Computer Science & Information Technology

You might also like to view...

What does the text pane of a SmartArt graphic offer?

A) A location where you can type text B) A place where you can change the font and font size C) A location where you can change the color of typed text D) A place where you can insert an object

Computer Science & Information Technology

Use of an incorrect formula to produce a desired result is a type of __________ error.

Fill in the blank(s) with correct word

Computer Science & Information Technology