Redundancy can be implemented at a number of points throughout the security architecture, such as in ________.

A. firewalls
B. proxy servers
C. access controls
D. All of the above

Answer: D

Computer Science & Information Technology

You might also like to view...

You cannot change a bulleted list to a numbered list

Indicate whether the statement is true or false

Computer Science & Information Technology

Form controls are also known as ________ fields

A) shaded B) form C) legacy D) text

Computer Science & Information Technology