_________ refers to the use of multiple, overlapping protection approaches addressing the people, technology, and operational aspects of information systems.

A) Layering
B) Modularity
C) Encapsulation
D) Open design


A) Layering

Computer Science & Information Technology

You might also like to view...

Memory modules have a(n) _______ that prevents you from inserting the module into the expansion slot the wrong way

Fill in the blank(s) with correct word

Computer Science & Information Technology

What are the three different types of port number ranges as defined by IANA?

What will be an ideal response?

Computer Science & Information Technology

Many who enter the field of information security are technical professionals such as __________ who find themselves working on information security applications and processes more often than traditional IT assignments.

A. networking experts or systems administrators B. database administrators C. programmers D. All of the above

Computer Science & Information Technology

What is a delayed branch and how does it contribute to minimizing the effect of pipeline bubbles? Why are delayed branch mechanisms less popular then they were?

What will be an ideal response?

Computer Science & Information Technology