A company must introduce a scalable network automation tool to deploy, configure, and manage thousands of network device and service. The company servers already have been security-hardened and must not have any additional software installed on team. The security policy mandates the use of a secure communication protocol that support authentication and encryption for managing the servers. Which two automation tools must be used to meet these requirements? (Choose two.)
Azzie
5 days agoRaylene
25 days agoVeronika
28 days agoPearly
1 months ago