Which of these items is a valid method to verify a network security design?
A.
network audit
B.
sign-off by the operations team
C.
computer simulation
D.
analysis of earlier attacks
E.
pilot or prototype network
Which of these items is a valid method to verify a network security design?
Which of these items is a valid method to verify a network security design?
A.
network audit
B.
sign-off by the operations team
C.
computer simulation
D.
analysis of earlier attacks
E.
pilot or prototype network