I've got a good feeling about D - Profiling rules. That seems to be the most relevant option based on what I know about network access control policies. I'll go with that for now.
I'm a little confused by this question. I'm not sure if the answer is A, B, C, or D. I'll have to review my notes and try to figure out the best approach.
Ashleigh
3 months agoMindy
3 months agoTruman
3 months agoStaci
4 months agoMartina
4 months agoSabra
4 months agoEnola
4 months agoMose
4 months agoWenona
5 months agoJosephine
5 months agoHarrison
5 months agoKristofer
5 months agoMaxima
5 months agoThurman
5 months agoJaime
9 months agoPamella
8 months agoLudivina
8 months agoBrock
8 months agoLing
9 months agoTaryn
9 months agoCarey
10 months agoBulah
8 months agoLawrence
8 months agoLarae
9 months agoKaycee
10 months agoDetra
8 months agoBarney
9 months agoEmeline
9 months agoSharan
10 months agoCheryl
9 months agoCelia
10 months agoTeresita
11 months agoFelton
11 months agoFlorencia
11 months ago