__________ is a strategy for the protection of information assets that uses multiple layers and different types of controls (managerial, operational, and technical) to provide optimal protection.
A. Networking
B. Proxy
C. Defense in depth
D. Best-effort
Answer: C
Computer Science & Information Technology
You might also like to view...
Layered defense for securing facilities is both physical and __________.
A) alarmed B) psychological C) monitored D) structural
Computer Science & Information Technology
When configuring the NFS server within YaST, the default root_squash option maps the root user to the ____ user.
A. nobody B. local C. default D. super
Computer Science & Information Technology
You can drag and copy a range to another location in the worksheet by double-clicking the cell.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
If you find an error in a merged document, the error should be corrected in the ________ document
A) merged B) linked C) record D) main
Computer Science & Information Technology