The purpose of a defense in depth strategy is:
a. To make protected assets difficult to find
b. To ensure that protected assets are reachable
c. To protect assets from unauthorized access
d. To protect assets using a variety of controls
d. To protect assets using a variety of controls
You might also like to view...
Communication over the copper wire used in DSL technologies is ____.
A. half-duplex B. simplex C. full-duplex D. reflex
A bootable Linux USB flash drive or CD that can be used to repair system issues is known by what term?
A. live CD B. repair disk C. boot CD D. supplemental OS
Which of the following sounds like a more efficient design method?
A. If you start with little details, you can keep adding them to the character. B. Start with the character's basic shape and add details, from basic to complex, little by little. C. You design each of the character's parts separately and finally join them together. D. It's always better to start from the eyes and then move down to design the rest of the character.
A theme and its variants are called a theme ____.
A. set B. group C. family D. template