ECCouncil Ethical Hacking and Countermeasures V8 EC0-350 Question # 141 Topic 15 Discussion

ECCouncil Ethical Hacking and Countermeasures V8 EC0-350 Question # 141 Topic 15 Discussion

EC0-350 Exam Topic 15 Question 141 Discussion:
Question #: 141
Topic #: 15

Which of the following techniques can be used to mitigate the risk of an on-site attacker from connecting to an unused network port and gaining full access to the network? (Choose three.)


A.

Port Security


B.

IPSec Encryption


C.

Network Admission Control (NAC)


D.

802.1q Port Based Authentication


E.

802.1x Port Based Authentication


F.

Intrusion Detection System (IDS)


Get Premium EC0-350 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.