Which of the following techniques should be used to prevent unauthorized access?
A network topology requires a switch to be placed in an unsecured location.
Which of the following techniques should be used to prevent unauthorized access? (Choose two.)
A . Disabling unused ports
B . Upgrading firmware
C . Using secure protocols
D . File hashing
E . MAC filtering
F . Configuring a honeypot
Answer: A,E
Latest N10-007 Dumps Valid Version with 601 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund
Subscribe
Login
0 Comments
Inline Feedbacks
View all comments