A. Deleted B. Unchanged C. Set D. Copied
A. Implement an intrusion detection system (IDS). B. Implement a dual-factor authentication method. C. Implement a patch management process. D. Implement stronger user passwords.
A. Full B. Differential C. Incremental D. Database