The Chief Information Security Officer (CISO) is concerned that users could bring their personal laptops to work and plug them directly into the network port under their desk. Which of the following should be configured on the network switch to prevent this from happening?

A. Access control lists
B. Loop protection
C. Firewall rule
D. Port security

Answer: D. Port security

Computer Science & Information Technology

You might also like to view...

A(n) ________ is created from one table and displays each record individually at the top of the window and then again as part of the whole table datasheet in the bottom of the window

Fill in the blank(s) with correct word

Computer Science & Information Technology

When selecting a range of cells for a chart, it is sometimes necessary to include an empty cell in the selection

Indicate whether the statement is true or false

Computer Science & Information Technology