If you got two or more wrong, revisit these materials in the Integrating security into the network lesson:
If you got four or more correct, return to Identity and Access Management Security School and start another lesson.
This was first published in August 2006
Security Management Strategies for the CIO
Join the conversationComment
Share
Comments
Results
Contribute to the conversation