Refer to the exhibit.
A junior engineer configured SNMP to network devices. Malicious users have uploaded different configurations to the network devices using SNMP and TFTP servers.
Which configuration prevents changes from unauthorized NMS and TFTP servers?
Currently there are no comments in this discussion, be the first to comment!