A company must introduce a scalable network automation tool to deploy, configure, and manage thousands of network device and service. The company servers already have been security-hardened and must not have any additional software installed on team. The security policy mandates the use of a secure communication protocol that support authentication and encryption for managing the servers. Which two automation tools must be used to meet these requirements? (Choose two.)
Carmen
1 months agoMoira
1 months agoSolange
2 days agoSophia
17 days agoJohnathon
1 months agoMeaghan
1 days agoCharlena
2 days agoMaira
12 days agoNelida
1 months agoYoulanda
4 days agoPortia
11 days agoGail
28 days agoAzzie
2 months agoAntonio
15 days agoPhillip
18 days agoMarge
27 days agoRaylene
3 months agoVeronika
3 months agoPearly
3 months ago