At an organization, unauthorized users have been accessing network resources via unused network wall jacks.
Which of the following would be used to stop unauthorized access?
Configure an access list.
Configure spanning tree protocol.
Configure port security.
Configure loop protection.
Port security in IT can mean several things. It can mean the physical control of all connection points, such as
RJ-45 wall jacks or device ports, so that no unauthorized users or unauthorized devices can attempt to connect
into an open port. This can be accomplished by locking down the wiring closet and server vaults and then
disconnecting the workstation run from the patch panel (or punch-down block) that leads to a room’s wall jack.
Any unneeded or unused wall jacks can (and should) be physically disabled in this manner. Another option is to
use a smart patch panel that can monitor the MAC address of any device connected to each and every wall port
across a building and detect not just when a new device is connected to an empty port, but also when a valid
device is disconnected or replaced by an invalid device.