CompTIA Network+ N10-009 Practice Question
An organization wishes to enforce policies that restrict access to sensitive resources from unauthorized network segments. Which security rule should primarily be configured to manage this access?
Access control list (ACL)
Content filtering
MAC filtering
Disable unused ports