The security team that monitors and audits a network has captured unexpected but regular network traffic being sent from the Backup Exec server to systems that are deliberately restricted from being involved with Backup Exec. The team has notified the backup administrator of the findings.
Which Backup Exec setting should the administrator change to stop the unexpected network traffic to restricted systems?
A . Allow Backup Exec to report anonymous usage information
B . Discover servers that have data that has not been backed up
C . Enable TCP dynamic port range
D . Check for updates automatically according to a schedule
Answer: A