Which security strategy requires using several, varying methods to protect IT systems against attacks?
A.
Defense in depth
B.
Three-way handshake
C.
Covert channels
D.
Exponential backoff algorithm
Which security strategy requires using several, varying methods to protect IT systems against attacks?
Which security strategy requires using several, varying methods to protect IT systems against attacks?
A.
Defense in depth
B.
Three-way handshake
C.
Covert channels
D.
Exponential backoff algorithm