A BYOD policy in which employees are able to access the wireless guest network is in effect in an organization. Some users however are using the Ethernet port in personal laptops to the wired network. Which of the following could an administrator use to ensure that unauthorized devices are not allowed to access the wired network?

A. VLAN access rules configured to reject packets originating from unauthorized devices
B. Router access lists configured to block the IP addresses of unauthorized devices
C. Firewall rules configured to block the MAC addresses of unauthorized devices
D. Port security configured shut down the port when unauthorized devices connect

Answer: D. Port security configured shut down the port when unauthorized devices connect

Computer Science & Information Technology

You might also like to view...

The Selection pane displays a list of all ________ on a slide

Fill in the blank(s) with correct word

Computer Science & Information Technology

Before tokenizing a string, you should use the ____________ method to remove leading and/or trailing white-space characters and prevent them from being included in the first and last tokens.

a. Trim b. Remove c. Split d. Sub string

Computer Science & Information Technology