Answer:
The technique of securing a network by controlling access to all entry and exit points of the network.
Previous Question | Next Question |
What is Virus? | What is Intrusion Detection? |
Previous Question | Next Question |
What is Virus? | What is Intrusion Detection? |