Using routers, firewalls, and intrusion detection systems in combination with real-time human monitoring is an example of which of the following?
A. Separation of duties
B. Defense in depth
C. Principle of least privilege
D. Intrusion monitoring
Answer: B
Explanation: Defense in depth is also known as layered security and involves using overlapping layers of security to protect data and resources.
You might also like to view...
Pick the C++ keywords out of the following list.
a) while b) total_weight c) double d) if e) number_of_bars
The String method substring returns ________.
a. a char b. a String c. void d. a char[]
A set of images, drawings, photographs, videos, and sound included with Microsoft Office or accessed from Microsoft Office online is called ________
A) styles B) templates C) clip art D) SmartArt
The FV function has two optional arguments, ________ and ________
A) pv; rate B) pv; type C) rate; payment D) payment; type