FUNDAMENTALS OF COMPUTER

COMPUTER THREATS SECURITY

TYPES OF NETWORK SECURITY

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Which of the following is a best practice when securing a switch from physical access?
A
Disable unnecessary accounts
B
Print baseline configurations
C
Enable access lists
D
Disable unused ports
Explanation: 

Detailed explanation-1: -Disable Unused Ports A simple method that many administrators use to help secure the network from unauthorized access is to disable all unused ports on a switch. For example, if a Catalyst 2960 switch has 24 ports and there are three Fast Ethernet connections in use, it is good practice to disable the 21 unused ports.

Detailed explanation-2: -Disabling unused ports can stop a bad guy from plugging a malicious device into an unused port and getting unauthorized access to the network. It can also help train users-especially those in remote offices-to call IT before moving things around.

Detailed explanation-3: -The simplest form of switch security is using port level security. When using port level security, the MAC address(es) and/or number of MAC addresses of the connected devices is controlled. There are three different ways that MAC addresses can be configured onto a port: Statically.

There is 1 question to complete.