Which security strategy requires using several, varying methods to protect IT systems against attacks?

Which security strategy requires using several, varying methods to protect IT systems
against attacks?

Which security strategy requires using several, varying methods to protect IT systems
against attacks?

A.
Defense in depth

B.
Three-way handshake

C.
Covert channels

D.
Exponential backoff algorithm



Leave a Reply to Ghost Man Cancel reply1

Your email address will not be published. Required fields are marked *

18 − two =


Ghost Man

Ghost Man

B is the Ans,