A network technician has been tasked to configure a new network monitoring tool that will examine interface settings throughout various network devices.
Which of the following would need to be configured on each network device to provide that information in a secure manner? standard of network management protocols. The security weaknesses of SNMPv1 and SNMPv2c are addressed in SNMPv3.
A.
S/MIME
B.
SYSLOG
C.
PGP
D.
SNMPv3
E.
RSH
Explanation:
The network monitoring need to use a network management protocol. SNMP has become the de facto