複選題
31. Which of the following techniques can be used to detect rogue or unauthorized hosts?
(hoose all that apply.)
(A) DHCP address assignment logs
(B) NAC
(C) Switch port and VLAN connection logs
(D) IP address
答案:登入後查看
統計: A(0), B(1), C(0), D(0), E(0) #3557273
統計: A(0), B(1), C(0), D(0), E(0) #3557273