To build an effective Security Policy, use a ________ and _______ rule.

To build an effective Security Policy, use a ________ and _______ rule.
A . Cleanup; stealth
B . Stealth; implicit
C . Cleanup; default
D . Implicit; explicit

Answer: A

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments