Which of the following should be configured on the netw…

The Chief Information Security Officer (CISO) is concerned that users could bring their personal laptops to work
and plug them directly into the network port under their desk. Which of the following should be configured on
the network switch to prevent this from happening?

The Chief Information Security Officer (CISO) is concerned that users could bring their personal laptops to work
and plug them directly into the network port under their desk. Which of the following should be configured on
the network switch to prevent this from happening?

A.
Access control lists

B.
Loop protection

C.
Firewall rule

D.
Port security



Leave a Reply 0

Your email address will not be published. Required fields are marked *