<h2><em>1) By drawing a row in the table using the draw option.
</em></h2><h2><em>
</em></h2><h2><em>2) By using the insert option under the Table Tools tab.
</em></h2><h2><em>
</em></h2><h2><em>3) By designing the table with an added row using the Design tab.</em></h2><h2><em></em></h2><h2><em>HOPE IT HELPS (◕‿◕✿)</em></h2>
Lydia used software to calculate the budget for each department. To create this budget, she used a spreadsheet.
The containment strategy prevents intruders from removing
information assets from the network, and
prevents attackers from using the organization's network as a launch point
for subsequent attacks.
In
a "block" containment strategy, in which the attacker's path into the
environment is disrupted, you should use the most precise strategy
possible, starting with <span>blocking a specific IP address. Correct answer: C
</span>