Which rule should be followed when implementing the security requirements of a network design?

IT Questions BankCategory: CCNA Discovery v4Which rule should be followed when implementing the security requirements of a network design?

Which rule should be followed when implementing the security requirements of a network design?

  • Always use a common security plan for all business needs.
  • As standard practice, lower access restrictions for users if cost is too high.
  • Avoid reducing security in order to add additional network capabilities.
  • When possible, implement an IDS to protect users from spam.

Exam with this question: CCNA Discovery 4: DCompNtwk Chapter 5 Exam

Subscribe
Notify of
guest

0 Comments
Inline Feedbacks
View all comments