Which of the following actions will you not take while applying network protection?
A.
Install intrusion detection software.
B.
Use secure electronic transaction protocols.
C.
Establish a firewall.
D.
Use simple password for a local computer.
Which of the following actions will you not take while applying network protection?
Which of the following actions will you not take while applying network protection?
A.
Install intrusion detection software.
B.
Use secure electronic transaction protocols.
C.
Establish a firewall.
D.
Use simple password for a local computer.