单项选择题
Which of the following technologies can be used as a means to isolate a host OS from some types of security threats?()
A.Intrusion detection B.Virtualization C.Kiting D.Cloning
单项选择题 WhichofthefollowingdescribesastaticNAT?()
单项选择题 WhichofthefollowingencryptionmethodsisoftenusedalongwithL2TP?()
单项选择题 Whichofthefollowingspecifiesasetofconsistentrequirementsforaworkstationorserver?()