Which option best describes defense-in-depth strategies?

Networks and computer systems employ defense-in-depth strategies to prevent a compromise. Which option best describes defense-in-depth strategies?
A. provide end-to-end security controls and mechanisms
B. provide attackers the ability to understand which types of security controls are in place
C. apply a layered approach to a set of systems or networks, by employing multiple security controls
D. eliminate single points of failure

cisco-exams

Leave a Reply

Your email address will not be published. Required fields are marked *


The reCAPTCHA verification period has expired. Please reload the page.