The purpose of a defense in depth strategy is:

a. To make protected assets difficult to find
b. To ensure that protected assets are reachable
c. To protect assets from unauthorized access
d. To protect assets using a variety of controls


d. To protect assets using a variety of controls

Computer Science & Information Technology

You might also like to view...

Communication over the copper wire used in DSL technologies is ____.

A. half-duplex B. simplex C. full-duplex D. reflex

Computer Science & Information Technology

A bootable Linux USB flash drive or CD that can be used to repair system issues is known by what term?

A. live CD B. repair disk C. boot CD D. supplemental OS

Computer Science & Information Technology

Which of the following sounds like a more efficient design method?

A. If you start with little details, you can keep adding them to the character. B. Start with the character's basic shape and add details, from basic to complex, little by little. C. You design each of the character's parts separately and finally join them together. D. It's always better to start from the eyes and then move down to design the rest of the character.

Computer Science & Information Technology

A theme and its variants are called a theme ____.

A. set B. group C. family D. template

Computer Science & Information Technology