A(n) _______ is the first step for determining which technical information assets should be
protected.
A. Network diagram
B. Business Impact Analysis
C. Office floor plan
D. Firewall
E. Intrusion detection system?

Submitted by: Administrator
A. Network diagram
Submitted by: Administrator

Read Online Check Point Certification Job Interview Questions And Answers