FUNDAMENTALS OF COMPUTER

COMPUTER THREATS SECURITY

TYPES OF NETWORK SECURITY

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
While configuring a new access layer switch, the administrator, Joe, was advised that he needed to make sure that only devices authorized to access the network would be permitted to login and utilize resources. Which of the following should the administrator implement to ensure this happens?
A
Log analysis
B
VLAN Management
C
Network Separation
D
802.1x
Explanation: 
There is 1 question to complete.