Mesh topology is best to use when there are more than 10 data communication devices.
Indicate whether the statement is true or false
Question 2
An integrated security system should incorporate preventive, detective, and ________ measures that are internal and external to the enterprise.
A) reactive
B) expensive
C) extraneous
D) networked