Computer Science, asked by bharatiravan56, 7 months ago

KNOWLEDGE
METER
A. Fill in the blanks.
1. Security holes may be present due to
planning, building, and operation of a network.
2. A firewall can be -based in the form of a hardware.
3. An antivirus is designed to identify
programs or codes,
4. A dedicated
is often used to implement the security protocols.
5. A
attack usually, includes a combination of multiple threats applied simultaneously.​

Answers

Answered by harshini3430
3

Answer:

seriously.....

I don't have time.

duh

Answered by 9429111459
11

Answer:

1-Inadequate

2-Host

3-Malware Program and Malicious Codes

4-Formal Verification

5-Blended

Explanation:

I Think this should be answer And Thany you for your Questions

Similar questions