I think defining a risk mitigation strategy is the way to go. We need to figure out how to manage this securely before making any decisions to ban or allow the device.
Okay, let me think this through. I'm pretty sure the correct answer is A, since that's where you would typically select the process definition to use. The other options don't seem quite right.
upvoted 0 times
...
Log in to Pass4Success
Sign in:
Report Comment
Is the comment made by USERNAME spam or abusive?
Commenting
In order to participate in the comments you need to be logged-in.
You can sign-up or
login
Marsha
4 months agoAndra
4 months agoCecilia
4 months agoElden
4 months agoRaymon
5 months agoFreeman
5 months agoAndra
5 months ago