What is perimeter defense?
A. divide two separate applications between networks to help manage security
B. divide two separate perimeters between networks to help manage security
C. divide two separate firewall between networks to help manage security
D. divide two separate digital certificates between networks to help manage security
Answer: B
Computer Science & Information Technology
You might also like to view...
Which of the following attacks specifically impact data availability?
A. DDoS B. Trojan C. MITM D. Rootkit
Computer Science & Information Technology
A comment that appears at the bottom of the page and contains the corresponding superscript number is called a _____.
A. footer B. note C. reference D. footnote
Computer Science & Information Technology