I'm pretty confident that option D is the correct answer. Transparent mode should solve the issue of not being able to use CDP or multicast in their environment.
I think the answer is B. The touch command is used to update the access and modification times of a file, so if the file already exists, it should just update those timestamps.
The key here is that the company is proactively trying to identify and mitigate security risks. Based on the port scan results, the Acceptable Use Policy is the most likely answer, as it would cover the authorized procedures for testing and securing the network.
Francesco
4 months agoShantell
4 months agoMadalyn
4 months agoJaney
4 months agoKeith
4 months agoLouis
5 months agoRonnie
5 months agoOretha
5 months agoJohnna
5 months agoMalissa
5 months agoDierdre
5 months agoAleta
5 months agoMy
5 months ago