Which of the following can the administrator MOST easily employ to prevent this unsecure practice, with the least administrative effort?
If the computer is powered off, which of the following data types will be unavailable for later investigation?
If a security administrator wants to TELNET into a router to make configuration changes, which of the following ports would need to be open by default?