Which of the following protocols permits secure polling of network devices?

A. SNMPv2
B. SCP
C. SNMPv3
D. SSH


Answer: C. SNMPv3

Computer Science & Information Technology

You might also like to view...

In the court’s opinion, a(n) ________ cannot be held liable for a defamatory statement unless it has knowledge of the content.

(a) publisher. (b) distributor. (c) host. (d) administrator.

Computer Science & Information Technology

A microcomputer system cabinet that is tall, narrow, and deep is called a tower.

a. true b. false

Computer Science & Information Technology

Which of the following is the FIRST option a technician should consider when deciding to purchase a docking station or port replicator?

A. Difficulty or ease of use for the end user B. OS compatibility C. Whether there are enough ports D. Compatibility of the device it connects to

Computer Science & Information Technology

The ________ extension method indicates that only unique values should be included in a LINQ query’s results.

a) Any b) Distinct c) Count d) None of the above

Computer Science & Information Technology