Much like the layers of an onion, ______________ is a comprehensive set of security solutions
layered to provide the best protection.
A.
Security policy
B.
Risk Assessment
C.
Defense in Depth
D.
Vulnerability Assessment
E.
Firewall Penetration Testing