a. What is defense in depth? 5a.) An attacker must break through two firewalls to get to

Question:

a. What is defense in depth?

5a.) An attacker must break through two firewalls to get to a host. This illustrates the principle called ________. (Select the most specific answer.)

a. Comprehensive security

b. Risk assurance

c. Weakest link protection

d. Defense in depth


b. Why is defense in depth necessary?

5b.) Vulnerabilities are occasionally found in even the best security products. Consequently, companies must ________ . (Select the most specific answer.)

a. Have comprehensive security

b. Have defense in depth

c. Do risk analysis

d. Only give minimum permissions


c. When does a weakest link exist?

5c.) There is a single countermeasure in ________ .

a. Weakest links

b. Defense in depth

c. Both A and B

d. Neither A nor B


d. Distinguish between defense in depth and weakest links.

Fantastic news! We've Found the answer you've been seeking!

Step by Step Answer:

Related Book For  book-img-for-question

Business Data Networks and Security

ISBN: 978-0134817125

11th Edition

Authors: Raymond R. Panko, Julia L. Panko

Question Posted: