Which of the following would be used to stop unauthorized access?

At an organization, unauthorized users have been accessing network resources via unused
network wall jacks. Which of the following would be used to stop unauthorized access?

At an organization, unauthorized users have been accessing network resources via unused
network wall jacks. Which of the following would be used to stop unauthorized access?

A.
Configure an access list.

B.
Configure spanning tree protocol.

C.
Configure port security.

D.
Configure loop protection.



Leave a Reply 0

Your email address will not be published. Required fields are marked *