Unauthorized devices have been detected on the internal network. The devices' locations were traced to
Ethernet ports located in conference rooms. Which of the following would be the best technical controls to
implement to prevent these devices from accessing the internal network?
A. NAC
B. DLP
C. IDS
D. MFA
Ethernet ports located in conference rooms. Which of the following would be the best technical controls to
implement to prevent these devices from accessing the internal network?
A. NAC
B. DLP
C. IDS
D. MFA