Which of the following mitigation techniques places devices in physically or logically separated networks and leverages policies to limit the types of communications that are allowed? A. Host-based rewalls B. Access control list C. Port security D. Least privilege Correct Answer: B This question is in SY0-601 exam For getting CompTIA Security+ certificate
Please login or Register to submit your answer