MCQOPTIONS
Saved Bookmarks
| 1. |
Which of the following strategies include prevention,detection of threats? |
| A. | An authentication server may be placed outside users and the portion of the system that provides services |
| B. | Network monitors may be installed for the inspection and logging of network events |
| C. | The system may be placed behind a communications”firewall” |
| D. | All of the mentioned |
| Answer» E. | |