Which security strategy requires using several, varying methods to protect IT systems
against attacks?
A.
Defense in depth
B.
Three-way handshake
C.
Covert channels
D.
Exponential backoff algorithm
Which security strategy requires using several, varying methods to protect IT systems
against attacks?
Which security strategy requires using several, varying methods to protect IT systems
against attacks?
A.
Defense in depth
B.
Three-way handshake
C.
Covert channels
D.
Exponential backoff algorithm