How are unauthorized devices installed in the network identified?
A.
by running change management reports
B.
by generating incident management reports
C.
by generating service asset and configuration reports
D.
by generating service level reports
How are unauthorized devices installed in the network identified?
How are unauthorized devices installed in the network identified?
A.
by running change management reports
B.
by generating incident management reports
C.
by generating service asset and configuration reports
D.
by generating service level reports