Which of the following components have home runs from different locations to the telecommunications closet?
Which of the following mitigation techniques would be used in order to defend against social engineering?