{"id":76,"date":"2020-03-29T09:07:27","date_gmt":"2020-03-29T08:07:27","guid":{"rendered":"https:\/\/exampracticetests.com\/eccouncil\/ceh-v10\/certified-ethical-hacker-312-50v10-question063\/"},"modified":"2020-03-29T09:07:27","modified_gmt":"2020-03-29T08:07:27","slug":"certified-ethical-hacker-312-50v10-question063","status":"publish","type":"post","link":"https:\/\/exampracticetests.com\/eccouncil\/ceh-v10\/certified-ethical-hacker-312-50v10-question063\/","title":{"rendered":"Certified Ethical Hacker 312-50v10 &#8211; Question063"},"content":{"rendered":"<div class=\"question\">Bob, a network administrator at BigUniversity, realized that some students are connecting their notebooks in the wired network to have Internet access. In the university campus, there are many Ethernet ports available for professors and authorized visitors but not for students.<br \/>\nHe identified this when the IDS alerted for malware activities in the network.<br \/>\nWhat should Bob do to avoid this problem?<br \/>\n<br \/><strong><br \/>A.<\/strong> Disable unused ports in the switches <br \/><strong>B.<\/strong> Separate students in a different VLAN <br \/><strong>C.<\/strong> Use the 802.1x protocol <br \/><strong>D.<\/strong> Ask students to use the wireless network<\/div>\n<p><\/p>\n<style> .hidden-div{ display:none } <\/style>\n<p>\t\t\t\t\t\t\t<button onclick=\"getElementById('hidden-div').style.display = 'block'\"> Show Answer <\/button> <button onclick=\"getElementById('hidden-div').style.display = 'none'\">Hide Answer<\/button><\/p>\n<div class=\"hidden-div\" id=\"hidden-div\"><span style=\"\"><\/p>\n<div class=\"answer\">Correct Answer: <strong>C<\/strong><\/div>\n<p><\/strong><\/span> <\/div>\n","protected":false},"excerpt":{"rendered":"<p>Bob, a network administrator at BigUniversity, realized that some students are connecting their notebooks in the wired network to have Internet access. In the university campus, there are many Ethernet ports available for professors and authorized visitors but not for students. He identified this when the IDS alerted for malware activities in the network. What [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[2],"tags":[3,66],"_links":{"self":[{"href":"https:\/\/exampracticetests.com\/eccouncil\/ceh-v10\/wp-json\/wp\/v2\/posts\/76"}],"collection":[{"href":"https:\/\/exampracticetests.com\/eccouncil\/ceh-v10\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/exampracticetests.com\/eccouncil\/ceh-v10\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/exampracticetests.com\/eccouncil\/ceh-v10\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/exampracticetests.com\/eccouncil\/ceh-v10\/wp-json\/wp\/v2\/comments?post=76"}],"version-history":[{"count":0,"href":"https:\/\/exampracticetests.com\/eccouncil\/ceh-v10\/wp-json\/wp\/v2\/posts\/76\/revisions"}],"wp:attachment":[{"href":"https:\/\/exampracticetests.com\/eccouncil\/ceh-v10\/wp-json\/wp\/v2\/media?parent=76"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/exampracticetests.com\/eccouncil\/ceh-v10\/wp-json\/wp\/v2\/categories?post=76"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/exampracticetests.com\/eccouncil\/ceh-v10\/wp-json\/wp\/v2\/tags?post=76"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}