Jeff, a technician, is charged with setting up network monitoring for critical devices in the network. It is important the information be sent securely to the monitoring station. Which of the following protocols will support secure transmission of the data?
A. SNMP v2
B. VPN
C. SYSLOG
D. SMTP
Answer: A. SNMP v2
Computer Science & Information Technology
You might also like to view...
Help and Support includes almost any Windows topic
Indicate whether the statement is true or false
Computer Science & Information Technology
In Word, what is not true about a Text box?
A) It can contain text or graphics. B) You can use several on a page at the same time. C) It is movable and resizable. D) It can only contain text.
Computer Science & Information Technology
________ lets you send e-mails to multiple individuals and select what permissions they have
Fill in the blank(s) with correct word
Computer Science & Information Technology
Which of the following biometric types obtains size, shape, or other layout attributes of a user's hand but can also measure bone length or finger length?
A. hand geometry scan B. finger scan C. palm or hand scan D. hand topography scan
Computer Science & Information Technology