Which of the following should the technician install and configure on the laptops if the threat is network based?
Which of the following physical security controls prevents an attacker from gaining access to a network closet?