heyrosaphoto6965 heyrosaphoto6965 02-01-2021 Computers and Technology contestada Your manager has asked you to improve network security by confining sensitive internal data traffic to computers on a specific subnet using access control lists (ACLs). On which device(s) should the ACLs be deployed