What could a security team use the command line tool Nmap for when implementing the Inventory and Control of Hardware Assets Control?

What could a security team use the command line tool Nmap for when implementing the Inventory and Control of Hardware Assets Control?
A . Control which devices can connect to the network
B . Passively identify new devices
C . Inventory offline databases
D . Actively identify new servers

Answer: D

Latest GCCC Dumps Valid Version with 93 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments