__________ is a strategy for the protection of information assets that uses multiple layers and different types of controls (managerial, operational, and technical) to provide optimal protection.

A. Networking
B. Proxy
C. Defense in depth
D. Best-effort


Answer: C

Computer Science & Information Technology

You might also like to view...

Layered defense for securing facilities is both physical and __________.

A) alarmed B) psychological C) monitored D) structural

Computer Science & Information Technology

When configuring the NFS server within YaST, the default root_squash option maps the root user to the ____ user.

A. nobody B. local C. default D. super

Computer Science & Information Technology

You can drag and copy a range to another location in the worksheet by double-clicking the cell.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

If you find an error in a merged document, the error should be corrected in the ________ document

A) merged B) linked C) record D) main

Computer Science & Information Technology