Secure space should always be accessed through ____.
A. secure perimeters
B. secure gateways
C. secure tunnels
D. secure retreats
Answer: A
Computer Science & Information Technology
You might also like to view...
The Remove Background tool in PowerPoint 2010 allows only a rectangle-shaped picture
Indicate whether the statement is true or false
Computer Science & Information Technology
Type I errors are more dangerous than Type II errors
Indicate whether the statement is true or false.
Computer Science & Information Technology