A company discovers an unauthorized device accessing network resources through one of many network drops in a common area used by visitors. The company decides that is wants to quickly prevent unauthorized devices from accessing the network but policy prevents the company from making changes on every connecting client. Which of the following should the company implement?
A. Port security
B. WPA2
C. Mandatory Access Control
D. Network Intrusion Prevention
Answer: A. Port security
Computer Science & Information Technology
You might also like to view...
The nudge feature, which enables an object to be repositioned by small incremental movements, makes use of the ________ key(s)
Fill in the blank(s) with correct word
Computer Science & Information Technology
Select the code below that uses CSS to configure a class called “offer” with blue text that uses the Arial or sans-serif font typeface.
a. ``` #offer { color:blue; font-family:Arial,sans-serif;} ``` b. ``` .offer { color:blue; font-family:Arial,sans-serif;} ``` c. ``` .offer { text:blue; font-family:Arial,sans-serif;} ``` d. ``` #offer { color:blue; font-family:Arial,sans-serif;} ```
Computer Science & Information Technology