16. Cryptography, digital signatures, access controls and routing controls considered which?
Pervasive security mechanisms
Business Policy
Specific security mechanisms
Security Policy
Answers
Answered by
10
Explanation:
Specific security mechanisms
Answered by
2
please please please please please please please please please please please please please please please please please please please please please please please please please please please please please please please please please
Similar questions
Math,
4 months ago
Hindi,
4 months ago
Hindi,
9 months ago
Math,
1 year ago
CBSE BOARD XII,
1 year ago