Enterprise continuity is focused on _____________________.
Fill in the blank(s) with the appropriate word(s).
recovery
Computer Science & Information Technology
You might also like to view...
In military time, 15:00 is ________ in non-military time
Fill in the blank(s) with correct word
Computer Science & Information Technology
The key used in symmetric encryption is referred to as a __________ key.
A. public B. secret C. private D. decryption
Computer Science & Information Technology