A.Segment security zones B.Restrict access to firewalls C.Use logs and alerts D.Set connection limits
A.Business needs B.Risk analysis C.Security policy D.Best practices
A.PKCS #7 B.PKCS #8 C.PKCS #10 D.PKCS #12