A security consultant decides to use multiple layers of anti-virus defense, such as end user desktop anti-virus
and E-mail gateway. This approach can be used to mitigate which kind of attack?
A.
Forensic attack
B.
ARP spoofing attack
C.
Social engineering attack
D.
Scanning attack