Exam4Training

Which of the following techniques should be used to prevent unauthorized access?

A network topology requires a switch to be placed in an unsecured location.

Which of the following techniques should be used to prevent unauthorized access? (Choose two.)
A . Disabling unused ports
B . Upgrading firmware
C . Using secure protocols
D . File hashing
E . MAC filtering
F . Configuring a honeypot

Answer: A,E

Latest N10-007 Dumps Valid Version with 601 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Exit mobile version