A network technician has been tasked to configure a new network monitoring tool that will examine interface settings throughout various network devices. Which of
the following would need to be configured on each network device to provide that information in a secure manner?

A.
S/MIME
B.
SYSLOG
C.
PGP
D.
SNMPv3
E.
RSH
Explanation:
The network monitoring need to use a network management protocol. SNMP has become the de facto standard of network management protocols. The security
weaknesses of SNMPv1 and SNMPv2c are addressed in SNMPv3.