Redundancy can be implemented at a number of points throughout the security architecture, such as in ________.
A. firewalls
B. proxy servers
C. access controls
D. All of the above
Answer: D
Computer Science & Information Technology