Which of the following is considered the MOST effective practice when securing printers or scanners in an
enterprise environment?
A.
Routine vulnerability scanning of peripherals
B.
Install in a hardened network segment
C.
Turn off the power to the peripherals at night
D.
Enable print sharing only from workstations