Discussion 1: "Ethernet Switches"
Please respond to the following:
• Since switches are generally used within the local network configuration, why would a network administrator configure port security on a switch? Can you think of a reason based on your study this week? Don't just give the answer from the materials; cite specific examples from real life. Have fun with it.
Discussion 2: "Security Administration and Access Control"
Please respond to the following:
• From the e-Activity, summarize the ethical dilemma, and develop a plan in which you would mitigate the vulnerability.
• Compare and contrast physical access controls and logical access controls. Further explain in what ways both physical and logical access controls are related to implementing a security policy.
e-activity
Research a specific lapse in professional ethics by an IT professional in the last five years. Be prepared to discuss.