Using multiple overlapping layers to secure data and resources is known as which of the following?
A. Principle of least privilege
B. Separation of duties
C. Defense in depth
D. Security triad
Answer: C
Explanation: Defense in depth is also known as layered security and involves using overlapping layers of security to protect data and resources.
You might also like to view...
Duration method ________ returns the Duration as a long value in milliseconds.
a. milliseconds b. term c. extent d. toMillis
Which of the following code displays the area of a circle if the radius is positive.
a. if (radius != 0) System.out.println(radius * radius * 3.14159); b. if (radius >= 0) System.out.println(radius * radius * 3.14159); c. if (radius > 0) System.out.println(radius * radius * 3.14159); d. if (radius <= 0) System.out.println(radius * radius * 3.14159);
A(n) ________ can be used in a Word table to perform calculations such as addition or division
A) parameter B) formula C) accumulator D) argument
All cables run horizontally (for the most part) from the ____________________ to the PCs.
Fill in the blank(s) with the appropriate word(s).