Which of the following should be implemented to stop an attacker from mapping out addresses and/or devices on a network?

Which of the following should be implemented to stop an attacker from mapping out addresses and/or devices on a network?




A. Single sign on
B. IPv6
C. Secure zone transfers
D. VoIP



Answer: C



Learn More :