Which three options are a result of utilizing a fragmented security model? (Choose three.)

Which three options are a result of utilizing a fragmented security model? (Choose three.)
A . individual components pieced together that are incompatible
B . multiple points of access that can be exploited by cyber criminals
C . additional fragmentation that reduces the risk from malicious files
D . decreased network accessibility through multiple applications
E . patchworked applications that continually increase in complexity
F . fragmented security that provides disbursed protection

Answer: CDF

Explanation:

https://www.cisco.com/c/en/us/products/collateral/security/whitepaper_c11-733368.html

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments