Defense in depth can best be described as which of the following?

A. a firewall that protects the network and the servers
B. a layered approach to security
C. antivirus software and firewalls
D. authentication and encryption


Answer: B

Computer Science & Information Technology

You might also like to view...

The digital forensics competency area is the primary responsibility of the ____ professional.

A. risk B. security compliance C. digital forensics D. incident management

Computer Science & Information Technology

Which of the following will insert the node pointed to by newPtr between the nodes pointed to by aPtr and bPtr in a linked list?

a) newPtr->link = aPtr; bPtr->link = aPtr; b) aPtr = newPtr->link; bPtr = newPtr->link; c) aPtr->link = newPtr->link; newPtr->link = bPtr->link; d) aPtr->link = newPtr; newPtr->link = bPtr;

Computer Science & Information Technology

The Graphics2D method(s) that determine(s) the color and texture for the shape to display is/are:

a. setStroke b. setPaint c. setTexture and setColor d. setTexturePaint

Computer Science & Information Technology

Which of the following is designed to guarantee that once data is written it cannot be modified? (Select TWO).

A. Flash B. DLT4 tapes C. CD-R D. SDLT tapes E. WORM

Computer Science & Information Technology