Jeff, a technician, is charged with setting up network monitoring for critical devices in the network. It is important the information be sent securely to the monitoring station. Which of the following protocols will support secure transmission of the data?

A. SNMP v2
B. VPN
C. SYSLOG
D. SMTP


Answer: A. SNMP v2

Computer Science & Information Technology

You might also like to view...

Help and Support includes almost any Windows topic

Indicate whether the statement is true or false

Computer Science & Information Technology

In Word, what is not true about a Text box?

A) It can contain text or graphics. B) You can use several on a page at the same time. C) It is movable and resizable. D) It can only contain text.

Computer Science & Information Technology

________ lets you send e-mails to multiple individuals and select what permissions they have

Fill in the blank(s) with correct word

Computer Science & Information Technology

Which of the following biometric types obtains size, shape, or other layout attributes of a user's hand but can also measure bone length or finger length?

A. hand geometry scan B. finger scan C. palm or hand scan D. hand topography scan

Computer Science & Information Technology