What is the order of the defensive layers a cracker would have to compromise when attacking a
properly secured network?
A) Firewall
B) Router
C) Application
D) Host
E) IDS
A.
B, E, A, D, C
B.
B, A, E, D, C
C.
A, B, C, D, E
D.
A, B, E, D, C
E.
A, E, B, D, C