Unauthorized devices have been detected on the internal network. The devices' locations were traced to Ethernet ports located in conference rooms. Which of the following would be the best technical controls to implement to prevent these devices from accessing the internal network?
mouettespaghetti
Highly Voted 2 years, 2 months agoApplebeesWaiter1122
Highly Voted 2 years, 1 month agocyberPunk28
Most Recent 1 year, 6 months agobruce_
1 year, 8 months agoEduSantos
2 years, 1 month ago