What is perimeter defense?

A. divide two separate applications between networks to help manage security
B. divide two separate perimeters between networks to help manage security
C. divide two separate firewall between networks to help manage security
D. divide two separate digital certificates between networks to help manage security

Answer: B

Computer Science & Information Technology

You might also like to view...

Which of the following attacks specifically impact data availability?

A. DDoS B. Trojan C. MITM D. Rootkit

Computer Science & Information Technology

A comment that appears at the bottom of the page and contains the corresponding superscript number is called a _____.

A. footer B. note C. reference D. footnote

Computer Science & Information Technology