The security department will audit an IT department to ensure that the proper guidelines are being followed. The reports of the call detail records show unauthorized access to PSTN. Which two actions should an administrator check to prevent the unauthorized use of the telephony system? (Choose two.)
cyberknock
9 months agoWilliamC
9 months, 1 week agoWilliamC
9 months, 3 weeks agoe971987
1 year, 2 months ago84db7a1
1 year, 3 months ago