Which of the following techniques should be used to prevent unauthorized access?

A network topology requires a switch to be placed in an unsecured location.

Which of the following techniques should be used to prevent unauthorized access? (Choose two.)
A . Disabling unused ports
B . Upgrading firmware
C . Using secure protocols
D . File hashing
E . MAC filtering
F . Configuring a honeypot

Answer: A,E

Latest N10-007 Dumps Valid Version with 601 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments