An attacker must break through two firewalls to get to a host.This illustrates the principle called ________.(Select the most specific answer.)
A) comprehensive security
B) having insurance
C) perimeter/internal defenses
D) defense in depth
Correct Answer:
Verified
Q2: The goal of security is to eliminate
Q29: Balancing threats against protection costs is called
Q66: Oversight activities include _.
A)vulnerability testing
B)creating guidelines
C)Both A
Q68: In authentication,the _ is the party trying
Q69: Attacking your own firm occurs in _.
A)vulnerability
Q71: Oversight helps ensure that a policy is
Q71: Implementation guidance is less specific than implementation.
Q73: Authentication should be _.
A)as strong as possible
B)appropriate
Q74: In general,people who receive access to a
Q75: _ is the general name for proofs
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents