Which of the following should a technician recommend to prevent physical access to individual office areas?
Which of following can BEST be used to determine the topology of a network and discover unknown devices?