Defense in depth can best be described as which of the following?
A. a firewall that protects the network and the servers
B. a layered approach to security
C. antivirus software and firewalls
D. authentication and encryption
Answer: B
You might also like to view...
The digital forensics competency area is the primary responsibility of the ____ professional.
A. risk B. security compliance C. digital forensics D. incident management
Which of the following will insert the node pointed to by newPtr between the nodes pointed to by aPtr and bPtr in a linked list?
a) newPtr->link = aPtr; bPtr->link = aPtr; b) aPtr = newPtr->link; bPtr = newPtr->link; c) aPtr->link = newPtr->link; newPtr->link = bPtr->link; d) aPtr->link = newPtr; newPtr->link = bPtr;
The Graphics2D method(s) that determine(s) the color and texture for the shape to display is/are:
a. setStroke b. setPaint c. setTexture and setColor d. setTexturePaint
Which of the following is designed to guarantee that once data is written it cannot be modified? (Select TWO).
A. Flash B. DLT4 tapes C. CD-R D. SDLT tapes E. WORM