PdfPrep.com

What are two methods used to protect the data center perimeter? (Choose two.)

What are two methods used to protect the data center perimeter? (Choose two.)
A . session authentication
B . DDoS protection
C . asset classification
D . network subnetting

Answer: AB

Exit mobile version