Defense in Depth helps to prevent ________ against an information system and its data because a break in one layer only leads the attacker to gain access to a single system.
A. indirect attacks
B. hacking attacks
C. internal attacks
D. direct attacks
Answer: D. direct attacks
You might also like to view...
Usability testing:
a. settles all internal debates b. should be used only at the end of the product design process c. often reveals problems that are more significant than the issues the test was supposed to resolve
The three values that can be used to initialize a pointer are _______, ______and ______.
Fill in the blank(s) with the appropriate word(s).
By changing themes and theme settings, you can quickly change the overall formatting of a document
Indicate whether the statement is true or false
Match the following Outlook Express folders to their descriptions:
I. Inbox A. Stores copies of messages that you have sent. II. Outbox B. Stores messages that have been sent to you. III. Sent Items C. Stores messages that you are in the process of writing. IV. Drafts D. Contains folders that are stored on your computer and mail server. V. Local Folders E. Stores messages that you want to send.