Which security strategy requires using several varying methods to protect IT systems against attacks?

Which security strategy requires using several varying methods to protect IT systems against attacks?
A . Defense in depth
B . Covert channels
C . Exponential backoff algorithm
D . Three-way handshake

Answer: A

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments