Prev Question
Next Question

Fill in the blank: To build an effective Security Policy, use a ________ and _______ rule.

A.
Cleanup; stealth

B.
Stealth; implicit

C.
Cleanup; default

D.
Implicit; explicit

Prev Question
Next Question

Leave a Reply

Your email address will not be published. Required fields are marked *