Alice was working on her major project; she saved all her confidential files and locked her laptop. Bob wanted to access Alice’s laptop for his personal use but was unable to access the laptop due to biometric authentication.
Which of the following network defense approaches was employed by Alice on her laptop?
A . Retrospective approach
B . Preventive approach
C . Reactive approach
D . Proactive approach
Answer: B
Latest 112-51 Dumps Valid Version with 75 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund