Networks and computer systems employ defense-in-depth strategies to prevent a compromise. Which option best describes defense-in-depth strategies?
A. provide end-to-end security controls and mechanisms
B. provide attackers the ability to understand which types of security controls are in place
C. apply a layered approach to a set of systems or networks, by employing multiple security controls
D. eliminate single points of failure