Which of the following mitigation techniques would an administrator apply to a device in order to restrict remote access?

Which of the following mitigation techniques would an administrator apply to a device in
order to restrict remote access?

Which of the following mitigation techniques would an administrator apply to a device in
order to restrict remote access?

A.
Disable TELNET

B.
Disable IGMP snooping

C.
Enable TELNET but not SSL

D.
Disable ICMP/ping on device



Leave a Reply 0

Your email address will not be published. Required fields are marked *