A company experiences an incident involving a user who connects an unmanaged switch to the network. Which of the following technologies should the company implement to help avoid similar incidents without conducting an asset inventory?
Which of the following are benefits of implementing MFA and SSO in an enterprise environment? (Choose two.)
A network administrator needs to deploy a subnet using an IP address range that can support at least 260 devices with the fewest wasted addresses. Which of the following subnets should the administrator use?
Which of the following will allow secure, remote access to internal applications?
A network administrator needs to disable all inbound and outbound telnet traffic in the network. Which of the following ports should the administrator disable?
A technician needs to identify a computer on the network that is reportedly downloading unauthorized content. Which of the following should the technician use?