Tag Archives: exploited

What are two recommendations for protecting network ports from being exploited when located in an office space outside of an IT closet? (Choose two.)

A. enable the PortFast feature on ports B. configure static ARP entries C. configure ports to a fixed speed D. implement port-based authentication E. shut down unused ports Answer: Option D, E. Explanation:  No answer description available for this question. Show AnswerDiscussion The post What are two recommendations for protecting network ports from being exploited when located in… Read More »