Posted by: Pdfprep
Post Date: November 1, 2020
Networks and computer systems employ defense-in-depth strategies to prevent a compromise.
Which option best describes defense-in-depth strategies?
A . provide end-to-end security controls and mechanisms
B . provide attackers the ability to understand which types of security controls are in place
C . apply a layered approach to a set of systems or networks, by employing multiple security controls
D . eliminate single points of failure
Answer: C