What common defense-in-depth method can help reduce the attack surface?
A. use 8-character passwords
B. replace copper connections with fiber-based connections
C. deploy IPS, firewalls, and AAA-based platforms and services
D. use UDP protocols to preserve bandwidth and protocol overhead
E. place systems on Internet-facing DMZ links to control traffic flows