You plan to implement a new security device on your network. Which of the following policies outlines the process you should follow before implementing that device?
answer choices
Change management
Acceptable use
Resource allocation
SLA

Answer :

Other Questions