What are two methods used to protect the data center perimeter? (Choose two.)
A . session authentication
B . DDoS protection
C . asset classification
D . network subnetting
Answer: AB
What are two methods used to protect the data center perimeter? (Choose two.)
A . session authentication
B . DDoS protection
C . asset classification
D . network subnetting
Answer: AB