多项选择题
What are three primary activities in the cycle of building an enterprise security strategy?()
A. activity audit B. administration C. policy establishment D. technology implementation
多项选择题 Whichtwoofthesearerecommendedpracticeswithtrunks?()
单项选择题 Whenisthesite-to-siteremoteaccessmodelappropriate?()
单项选择题 Whichroutingprotocolsupportsaflexibleareastructureusingroutinglevelsoneandtwo?()