Which one of the following options?

Implementing a "threat-centric" security strategy means to focus on which one of the following options?
A. defenses
B. attacks
C. company assets
D. compliance regulations
E. security controls

cisco-exams

Leave a Reply

Your email address will not be published. Required fields are marked *


The reCAPTCHA verification period has expired. Please reload the page.