List of questions
Related questions
Question 218 - SY0-601 discussion
An organization is concerned about hackers potentially entering a facility and plugging in a remotely accessible Kali Linux box. Which of the following should be the first lines of defense against such an attack? (Select TWO).
A.
MAC filtering
B.
Zero trust segmentation
C.
Network access control
D.
Access control vestibules
E.
Guards
F.
Bollards.
Your answer:
0 comments
Sorted by
Leave a comment first