Using multiple overlapping layers to secure data and resources is known as which of the following?

A. Principle of least privilege
B. Separation of duties
C. Defense in depth
D. Security triad


Answer: C
Explanation: Defense in depth is also known as layered security and involves using overlapping layers of security to protect data and resources.

Computer Science & Information Technology

You might also like to view...

Duration method ________ returns the Duration as a long value in milliseconds.

a. milliseconds b. term c. extent d. toMillis

Computer Science & Information Technology

Which of the following code displays the area of a circle if the radius is positive.

a. if (radius != 0) System.out.println(radius * radius * 3.14159); b. if (radius >= 0) System.out.println(radius * radius * 3.14159); c. if (radius > 0) System.out.println(radius * radius * 3.14159); d. if (radius <= 0) System.out.println(radius * radius * 3.14159);

Computer Science & Information Technology

A(n) ________ can be used in a Word table to perform calculations such as addition or division

A) parameter B) formula C) accumulator D) argument

Computer Science & Information Technology

All cables run horizontally (for the most part) from the ____________________ to the PCs.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology