Which of the following are method used to prevent an unauthenticated compute from establishing a connection as a node on a corporate network?

Which of the following are method used to prevent an unauthenticated compute from establishing a connection as a node on a corporate network? (Select TWO.)
A. Port security
B. Anti-malware
C. Certificate
D. IDS
E. Firewall
F. Captive portal

CompTIA A+ 220-1102 (Core 1) Exam

FULL Printable PDF and Software. VALID exam to help you PASS.

comptia-exams

Leave a Reply

Your email address will not be published. Required fields are marked *


The reCAPTCHA verification period has expired. Please reload the page.