A company must introduce a scalable network automation tool to deploy, configure, and manage thousands of network devices and servers. The company servers already have been security-hardened and must not have any additional software installed on them. The security policy mandates the use of a secure communication protocol that supports authentication and encryption for managing the servers.
Which two automation tools must be used to meet these requirements? (Choose two.)
Wasamela
11 months agoRick099
1 year, 6 months agof143c37
1 year, 11 months ago