KNOWLEDGE
METER
A. Fill in the blanks.
1. Security holes may be present due to
planning, building, and operation of a network.
2. A firewall can be -based in the form of a hardware.
3. An antivirus is designed to identify
programs or codes,
4. A dedicated
is often used to implement the security protocols.
5. A
attack usually, includes a combination of multiple threats applied simultaneously.
Answers
Answered by
3
Answer:
seriously.....
I don't have time.
duh
Answered by
11
Answer:
1-Inadequate
2-Host
3-Malware Program and Malicious Codes
4-Formal Verification
5-Blended
Explanation:
I Think this should be answer And Thany you for your Questions
Similar questions