Which of these items is a valid method to verify a network security design?

Which of these items is a valid method to verify a network security design?

Which of these items is a valid method to verify a network security design?

A.
network audit

B.
sign-off by the operations team

C.
computer simulation

D.
analysis of earlier attacks

E.
pilot or prototype network



Leave a Reply 0

Your email address will not be published. Required fields are marked *