Which of the following should be implemented to stop an attacker from mapping out addresses and/or devices on a network?
A. Single sign on
B. IPv6
C. Secure zone transfers
D. VoIP
CompTIA exam questions
Which of the following should be implemented to stop an attacker from mapping out addresses and/or devices on a network?
A. Single sign on
B. IPv6
C. Secure zone transfers
D. VoIP