Which of the following actions should the IT security team implement to help protect the network from attack as a result of this new policy?
Which of the following technologies is designed to keep systems uptime running in the event of a disaster?