Which security strategy requires using several, varying methods to protect IT systems against attacks?
A. Defense in depth
B. Three-way handshake
C.
Covert channels
D. Exponential backoff algorithm
Which security strategy requires using several, varying methods to protect IT systems against attacks?
A. Defense in depth
B. Three-way handshake
C.
Covert channels
D. Exponential backoff algorithm
You must be logged in to post a comment.