Which two components should be part of a security implementation plan?()

A . detailed list of personnel assigned to each task within the plan B . a Layer 2 spanning tree design topology C . rollback guidelines D . placing all unused access ports in VLAN 1 to proactively manage port security E . enabling SNMP access to Cisco Discovery Protocol data for logging and forensic analysi

时间:2022-11-04 07:49:19 所属题库:CCNP(642-813)题库

相似题目