Scan QR code or get instant email to install app
Question:
Managing her organization’s IP address schema and usage will allow Dara to identify unknown and potentially rogue devices. IP addresses are not used to secure encryption keys, and managing a schema will not help prevent denial-of-service attacks. Keeping track of what IP addresses are in use can help avoid IP address exhaustion, but this doesn’t provide a direct security advantage.
Comments