A network topology requires a switch to be placed in an unsecured location. Which of the following techniques should be used to prevent unauthorized access? (Choose two.)
A. Disabling unused ports
B. Upgrading firmware
C. Using secure protocols
D. File hashing
E. MAC filtering
F. Configuring a honeypot
Exam N10-008: CompTIA Network+Free dumps for N10-008 in PDF format.High quality N10-008 PDF and software. VALID exam to help you pass. |