List of questions
Related questions
Question 22 - NSE6_FNC-7.2 discussion
Which devices would be evaluated by device profiling rules?
A.
Rogue devices, each time they connect
B.
All hosts, each time they connect
C.
Known trusted devices, each time they change location
D.
Rogue devices, only when they are initially added to the database
Your answer:
0 comments
Sorted by
Leave a comment first