A network switch was installed to provide connectivity to cameras monitoring wildlife in a remote location. The
organization is concerned that intruders could potentially leverage unattended equipment in the remote location
to connect rogue devices and gain access to the organization's resources. Which of the following techniques
would BEST address the concern?
A. Configure port security using MAC filtering.
B. Manually register the cameras on the switch address table.
C. Activate PoE+ on the active switchports.
D. Disable Neighbor Discovery Protocol on the switch.
organization is concerned that intruders could potentially leverage unattended equipment in the remote location
to connect rogue devices and gain access to the organization's resources. Which of the following techniques
would BEST address the concern?
A. Configure port security using MAC filtering.
B. Manually register the cameras on the switch address table.
C. Activate PoE+ on the active switchports.
D. Disable Neighbor Discovery Protocol on the switch.