Which network management protocol relies on multiple connections between a managed device and the management station…?
Which two measures would you recommend to reduce the likelihood of a successfully executed network attack from the Internet?