Which of the following is a best practice when securing a switch from physical access?

A.
Disable unnecessary accounts
B.
Print baseline configuration
C.
Enable access lists
D.
Disable unused ports
Explanation:
Disabling unused switch ports a simple method many network administrators use to help secure
their network from unauthorized access.
All ports not in use should be disabled. Otherwise, they present an open door for an attacker toenter.
Seems incorrectly worded. An intrusion exploiting an open port does not require physical access to the device, just network access.
0
0
They are talking about the physical switch port. Not the port list for services.
0
0