Secure space should always be accessed through ____.

A. secure perimeters
B. secure gateways
C. secure tunnels
D. secure retreats

Answer: A

Computer Science & Information Technology

You might also like to view...

The Remove Background tool in PowerPoint 2010 allows only a rectangle-shaped picture

Indicate whether the statement is true or false

Computer Science & Information Technology

Type I errors are more dangerous than Type II errors

Indicate whether the statement is true or false.

Computer Science & Information Technology