Endpoints security solutions leverage a _____________ model for protecting various endpoints. 1. Client/server 2. Non-interference model 3. Peer-to-peer
Correct Answer is 1. Client/server