faithatkinson781 faithatkinson781 24-08-2022 Computers and Technology contestada When trying to protect your network, you should create your secure network based on _______.