Register now or log in to join your professional community.
of a NAC (network admissions control) appliance that uses the network infrastructure to enforce security policy compliance on all devices seeking to access network computing resources, thereby limiting damage from emerging security threats. Her project team has just completed the initial project budget and schedule and is ensure what to perform next. Which of following would you recommend as the NEXT BEST action to perform? A. Start project iteration B. Identify project risks C. Develop the WBS D. Identify communications requirements E. Develop the PDM
D. Identify communications requirements