Which of the following should be restricted from a network administrator ' s privileges in an adequately segregated IT environment?
Monitoring network traffic
Changing existing configurations for applications
Hardening network ports
Ensuring transmission protocols are functioning correctly
Submit