Which of the following mitigation techniques would an administrator apply to a device in
order to restrict remote access?
A.
Disable TELNET
B.
Disable IGMP snooping
C.
Enable TELNET but not SSL
D.
Disable ICMP/ping on device
Which of the following mitigation techniques would an administrator apply to a device in
order to restrict remote access?
Which of the following mitigation techniques would an administrator apply to a device in
order to restrict remote access?
A.
Disable TELNET
B.
Disable IGMP snooping
C.
Enable TELNET but not SSL
D.
Disable ICMP/ping on device