List of questions
Related questions
Question 235 - H12-724 discussion
Which of the following methods can be used to protect enterprise terminal security?
A.
Access control
B.
Encrypted access
C.
Business isolation
D.
Audit billing
Your answer:
0 comments
Sorted by
Leave a comment first