What is the primary purpose of utilizing this to protect the endpoint from unauthorized device insertions?
1) Data encryption
2) Firewall
3) Antivirus software
4) Port security

Q&A Platform for Education
Platform Explore for Education