A security consultant decides to use multiple layers of anti-virus defense, such as end user
desktop anti-virus and E-mail gateway. This approach can be used to mitigate which kind of
attack?
A.
Forensic attack
B.
ARP spoofing attack
C.
Social engineering attack
D.
Scanning attack