Which two practices are recommended for an acceptable security posture in a network? (Choose two.)
A. Use a cryptographic keychain to authenticate to network devices.
B. Place internal email and file servers in a designated DMZ.
C. Back up device configurations to encrypted USB drives for secure retrieval.
D. Disable unused or unnecessary ports, interfaces, and services.
E. Maintain network equipment in a secure location.
A. Use a cryptographic keychain to authenticate to network devices.
B. Place internal email and file servers in a designated DMZ.
C. Back up device configurations to encrypted USB drives for secure retrieval.
D. Disable unused or unnecessary ports, interfaces, and services.
E. Maintain network equipment in a secure location.