GAQM Certified Ethical Hacker (CEH) CEH-001 Question # 124 Topic 13 Discussion

GAQM Certified Ethical Hacker (CEH) CEH-001 Question # 124 Topic 13 Discussion

CEH-001 Exam Topic 13 Question 124 Discussion:
Question #: 124
Topic #: 13

Which of the following techniques can be used to mitigate the risk of an on-site attacker from connecting to an unused network port and gaining full access to the network? (Choose three.)


A.

Port Security


B.

IPSec Encryption


C.

Network Admission Control (NAC)


D.

802.1q Port Based Authentication


E.

802.1x Port Based Authentication


F.

Intrusion Detection System (IDS)


Get Premium CEH-001 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.