Which two practices are recommended for an acceptable security posture in a network? (Choose two)
Backup device configurations to encrypted USB drives for secure retrieval
maintain network equipment in a secure location
Use a cryptographic keychain to authenticate to network devices
Place internal email and file servers in a designated DMZ
Disable unused or unnecessary ports, interfaces and services
Submit