Which security strategy requires using several, varying methods to protect IT systems against attacks?

Which security strategy requires using several, varying methods to protect IT systems
against attacks?

Which security strategy requires using several, varying methods to protect IT systems
against attacks?

A.
Defense in depth

B.
Three-way handshake

C.
Covert channels

D.
Exponential backoff algorithm



Leave a Reply 0

Your email address will not be published. Required fields are marked *