A client who shares office space and an IT closet with another company recently reported connectivity issues
throughout the network. Multiple third-party vendors regularly perform on-site maintenance in the shared IT
closet. Which of the following security techniques would BEST secure the physical networking equipment?
A. Disabling unneeded switchports
B. Implementing role-based access
C. Enabling logging
D. Configuring an access control list
throughout the network. Multiple third-party vendors regularly perform on-site maintenance in the shared IT
closet. Which of the following security techniques would BEST secure the physical networking equipment?
A. Disabling unneeded switchports
B. Implementing role-based access
C. Enabling logging
D. Configuring an access control list