PdfPrep.com

What are two recommendations for protecting network ports from being exploited when located in an office space outside of an IT closet? (Choose two)

What are two recommendations for protecting network ports from being exploited when located in an office space outside of an IT closet? (Choose two)
A . shut down unused ports
B . configure static ARP entries
C . enable the PortFast feature on ports
D . implement port-based authentication
E . configure ports to a fixed speed

Answer: AD

Exit mobile version