What are two methods used to protect the data center perimeter? (Choose two.)

Posted by: Pdfprep Category: JN0-1301 Tags: , ,

What are two methods used to protect the data center perimeter? (Choose two.)
A . session authentication
B . DDoS protection
C . asset classification
D . network subnetting

Answer: AB

Leave a Reply

Your email address will not be published.