Enterprise continuity is focused on _____________________.

Fill in the blank(s) with the appropriate word(s).

recovery

Computer Science & Information Technology

You might also like to view...

In military time, 15:00 is ________ in non-military time

Fill in the blank(s) with correct word

Computer Science & Information Technology

The key used in symmetric encryption is referred to as a __________ key.

A. public B. secret C. private D. decryption

Computer Science & Information Technology