List of questions
Related questions
Question 4 - NSE6_FNC-7.2 discussion
Which connecting endpoints are evaluated against all enabled device profiling rules?
A.
All hosts, each time they connect
B.
Rogues devices, only when they connect for the first time
C.
Known trusted devices each time they change location
D.
Rogues devices, each time they connect
Your answer:
0 comments
Sorted by
Leave a comment first