Which of the following is NOT a part of defining the physical and security requirements of a site?
A. the type of encryption that will be used
B. which applications run on the network
C. the type of authentication needed
D. whether the APs be secured and connected to the wired network
Answer: B
Computer Science & Information Technology
You might also like to view...
adds vector B to vector A Vect& operator+=( Vect& vectA, const Vect& vectB )
What will be an ideal response?
Computer Science & Information Technology
Each Group Policy Object is assigned a globally unique identifier (GUID) of what length?
A. 16 bits B. 32 bits C. 64 bits D. 128 bits
Computer Science & Information Technology
_________ is configured so that incoming messages are stored in an Inbox on the Web.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
Those with knowledge of threats & attacks help the groups defending systems as a part of a community risk assessment model to secure systems
a. true b. false
Computer Science & Information Technology