What should security policies encompass to help mitigate the threat of convergence?

a. Data networks only.
b. Voice networks only.
c. Both voice and data networks.
d. Neither voice nor data networks.

Ans: c. Both voice and data networks.

Computer Science & Information Technology

You might also like to view...

What are the benefits of aggregate functions? List three examples of aggregate functions

What will be an ideal response?

Computer Science & Information Technology

A tree T is called a(n) ____________________ of graph G if T is a subgraph of G such that V(T ) = V(G).

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology