Which rule should be followed when implementing the security requirements of a network design?
- Always use a common security plan for all business needs.
- As standard practice, lower access restrictions for users if cost is too high.
- Avoid reducing security in order to add additional network capabilities.
- When possible, implement an IDS to protect users from spam.
Exam with this question: CCNA Discovery 4: DCompNtwk Chapter 5 Exam
Please login or Register to submit your answer