1.

Which of the following strategies include prevention,detection of threats?

A. An authentication server may be placed outside users and the portion of the system that provides services
B. Network monitors may be installed for the inspection and logging of network events
C. The system may be placed behind a communications”firewall”
D. All of the mentioned
Answer» E.


Discussion

No Comment Found