GIAC Information Security Fundamentals
Question No. 1
Which of the following protocols is used to provide remote monitoring and administration to network management machines on the network? The management machines will use this protocol to collect information for network monitoring. At times, the protocol can also be used for remote configuration.
Choose the correct option from the given list.
01 / 313