What could a security team use the command line tool Nmap for when implementing the Inventory and Control of Hardware Assets Control?
What could a security team use the command line tool Nmap for when implementing the Inventory and Control of Hardware Assets Control?
A . Control which devices can connect to the network
B . Passively identify new devices
C . Inventory offline databases
D . Actively identify new servers
Answer: D
Latest GCCC Dumps Valid Version with 93 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund
Subscribe
Login
0 Comments
Inline Feedbacks
View all comments