The Chief Information Security Officer (CISO) is concerned that users could bring their personal laptops to work and plug them directly into the network port under their desk. Which of the following should be configured on the network switch to prevent this from happening?
A. Access control lists
B. Loop protection
C. Firewall rule
D. Port security
Answer: D. Port security
Computer Science & Information Technology
You might also like to view...
A(n) ________ is created from one table and displays each record individually at the top of the window and then again as part of the whole table datasheet in the bottom of the window
Fill in the blank(s) with correct word
Computer Science & Information Technology
When selecting a range of cells for a chart, it is sometimes necessary to include an empty cell in the selection
Indicate whether the statement is true or false
Computer Science & Information Technology