多项选择题
What are three primary activities in the cycle of building an enterprise security strategy?()
A. activity audit B. administration C. policy establishment D. technology implementation
多项选择题 Which two of these are recommended practices with trunks? ()
单项选择题 When is the site-to-site remote access model appropriate? ()
多项选择题 Which two design concerns must be addressed when designing a multicast implementation?()