PdfPrep.com

To build an effective Security Policy, use a ________ and _______ rule.

To build an effective Security Policy, use a ________ and _______ rule.
A . Cleanup; stealth
B . Stealth; implicit
C . Cleanup; default
D . Implicit; explicit

Answer: A

Exit mobile version