header bg

Scan QR code or get instant email to install app

Question:

Dara has been asked to include IP schema management as part of her configuration management efforts. Which of the following is a security advantage of IP schema configuration management?

A Detecting rogue devices.
explanation

Managing her organization’s IP address schema and usage will allow Dara to identify unknown and potentially rogue devices. IP addresses are not used to secure encryption keys, and managing a schema will not help prevent denial-of-service attacks. Keeping track of what IP addresses are in use can help avoid IP address exhaustion, but this doesn’t provide a direct security advantage.

Related Information

Comments

Leave a Reply

Your email address will not be published. Required fields are marked *

*