Which of the following actions will you not take while applying network protection?

Which of the following actions will you not take while applying network protection?

Which of the following actions will you not take while applying network protection?

A.
Install intrusion detection software.

B.
Use secure electronic transaction protocols.

C.
Establish a firewall.

D.
Use simple password for a local computer.



Leave a Reply 0

Your email address will not be published. Required fields are marked *