What are two methods used to protect the data center perimeter? (Choose two.)
A. session authentication
B. DDoS protection
C. asset classification
D. network subnetting
What are two methods used to protect the data center perimeter? (Choose two.)
A. session authentication
B. DDoS protection
C. asset classification
D. network subnetting