List of questions
Related questions
Question 28 - CISM discussion
When properly implemented, secure transmission protocols protect transactions:
A.
from eavesdropping.
B.
from denial of service (DoS) attacks.
C.
on the client desktop.
D.
in the server's database.
Your answer:
0 comments
Sorted by
Leave a comment first