Of the options shown below, what is the first step in protecting network devices?
Of the options shown below, what is the first step in protecting network devices?A . Creating standard secure configurations for all devicesB . Scanning the devices for known vulnerabilitiesC . Implementing IDS to detect...