D I think because none of the others seem like very important things,
A, B , and E sorry if I’m wrong
Answer:
I find 5 categories
Explanation:
1 Overview
2 Necessity
3 Types
4 Attended installation
4.1 Silent installation
4.2 Unattended installation
4.3 Headless installation
4.4 Scheduled or automated installation
4.5 Clean installation
4.6 Network installation
5 Installer
5.1 Bootstrapper
5.2 Common types
5.3 System installer
Answer:
True
Explanation:
As employees might be accessing business/client data, security of data access is a topmost priority.