Which of the following should be implemented to stop an attacker from mapping out addresses and/or devices on a network?

Which of the following should be implemented to stop an attacker from mapping out addresses
and/or devices on a network?

Which of the following should be implemented to stop an attacker from mapping out addresses
and/or devices on a network?

A.
Single sign on

B.
IPv6

C.
Secure zone transfers

D.
VoIP



Leave a Reply 0

Your email address will not be published. Required fields are marked *