Which of the following should be implemented to stop an attacker from mapping out addresses and/or devices on a network?
A.
Single sign on
B.
IPv6
C.
Secure zone transfers
D.
VoIP
Which of the following should be implemented to stop an attacker from mapping out addresses and/or devices on a network?
Which of the following should be implemented to stop an attacker from mapping out addresses and/or devices on a network?
A.
Single sign on
B.
IPv6
C.
Secure zone transfers
D.
VoIP