Drag the mechanism on the left to the appropriate security device that uses it to implement … seenagape 9 years ago DRAG DROPDrag the mechanism on the left to the appropriate security device that uses it to implement high-availability design. Answer: Explanation: ← Previous question Next question →