Question 1
a) A network technician has been tasked to configure a new network monitoring tool that will examine interface settings throughout various network devices. Explain the protocol needed to be configured on each network device to provide that information in a secure manner
b) A company has decided to update their usage policy to allow employees to surf the web unrestricted from their work computers. Which policy should the IT security team implement to help protect the network from attack as a result of this new policy
c)
Explain why a management protocol needed between managers and agents, and why
isn't mere connectivity between them sufficient?
Comments
Leave a comment