Computer Science, asked by vamsi58d, 9 months ago

16. Cryptography, digital signatures, access controls and routing controls considered which?
Pervasive security mechanisms
Business Policy
Specific security mechanisms
Security Policy​

Answers

Answered by Ayush00711
10

Explanation:

Specific security mechanisms

Answered by kathuriapriyanka17
2

please please please please please please please please please please please please please please please please please please please please please please please please please please please please please please please please please

Similar questions