A BYOD policy in which employees are able to access the wireless guest network is in effect in an organization. Some users however are using the Ethernet port in personal laptops to the wired network. Which of the following could an administrator use to ensure that unauthorized devices are not allowed to access the wired network?
A. VLAN access rules configured to reject packets originating from unauthorized devices
B. Router access lists configured to block the IP addresses of unauthorized devices
C. Firewall rules configured to block the MAC addresses of unauthorized devices
D. Port security configured shut down the port when unauthorized devices connect
Answer: D. Port security configured shut down the port when unauthorized devices connect
You might also like to view...
The Selection pane displays a list of all ________ on a slide
Fill in the blank(s) with correct word
Before tokenizing a string, you should use the ____________ method to remove leading and/or trailing white-space characters and prevent them from being included in the first and last tokens.
a. Trim b. Remove c. Split d. Sub string