Question 8
Question 8 of 10

Question image for Q8
Topics Tested

Explain how a range of solutions are used to help keep data safe from security threats

Explain the suitability of each method of data transmission, for a given scenario