CompTIA Network+ N10-009 Practice Question
An organization wishes to enforce policies that restrict access to sensitive resources from unauthorized network segments. Which security rule should primarily be configured to manage this access?
MAC filtering
Access control list (ACL)
Content filtering
Disable unused ports