Which of the following statements about layered security approach is true?

a. The perimeter is secured, but the systems within the perimeter are vulnerable.
b. The systems within the perimeter are secured, but the perimeter is vulnerable.
c. Both the perimeter and the individual systems within the perimeter are secured.
d. Both the perimeter and the individual systems within the perimeter are vulnerable.


ANS: C

Computer Science & Information Technology

You might also like to view...

If you are shopping at a website that is not well-known, you can protect your credit card information by using a third-party payment site such as PayPal

Indicate whether the statement is true or false

Computer Science & Information Technology

An icon set can make data visually easier to interpret

Indicate whether the statement is true or false

Computer Science & Information Technology

Case 3-2Caroline is writing a program in Java which asks the user to input their first and last name, and then will output a welcome message.Caroline uses the ____ character to include quotation marks in the welcome message.

A. escape B. output C. concatenation D. forward slash

Computer Science & Information Technology

An enhanced feature of SSH is known as port forwarding, also called ____________________.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology