Which of the following is NOT a part of defining the physical and security requirements of a site?

A. the type of encryption that will be used
B. which applications run on the network
C. the type of authentication needed
D. whether the APs be secured and connected to the wired network


Answer: B

Computer Science & Information Technology

You might also like to view...

adds vector B to vector A Vect& operator+=( Vect& vectA, const Vect& vectB )

What will be an ideal response?

Computer Science & Information Technology

Each Group Policy Object is assigned a globally unique identifier (GUID) of what length?

A. 16 bits B. 32 bits C. 64 bits D. 128 bits

Computer Science & Information Technology

_________ is configured so that incoming messages are stored in an Inbox on the Web.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Those with knowledge of threats & attacks help the groups defending systems as a part of a community risk assessment model to secure systems

a. true b. false

Computer Science & Information Technology