Answer:
c Preventing data transmissions between a suspect’s computer and a network server
Step-by-step explanation:
6.5m questions
8.6m answers