_________ refers to the use of multiple, overlapping protection approaches addressing the people, technology, and operational aspects of information systems.
A) Layering
B) Modularity
C) Encapsulation
D) Open design
A) Layering
You might also like to view...
Memory modules have a(n) _______ that prevents you from inserting the module into the expansion slot the wrong way
Fill in the blank(s) with correct word
What are the three different types of port number ranges as defined by IANA?
What will be an ideal response?
Many who enter the field of information security are technical professionals such as __________ who find themselves working on information security applications and processes more often than traditional IT assignments.
A. networking experts or systems administrators B. database administrators C. programmers D. All of the above
What is a delayed branch and how does it contribute to minimizing the effect of pipeline bubbles? Why are delayed branch mechanisms less popular then they were?
What will be an ideal response?