0 Comments
Answer:
Step-by-step explanation:
C. It can discover information from routers, firewalls, and switches. D. It runs on the physical layer and the data link layer.