Posted by: Pdfprep
Post Date: December 20, 2020
What is a byproduct when defense-in-depth strategies are not applied to network architecture design?
A . An attacker will have a single point of entry into a system.
B . Weaknesses in the security posture, such as weak passwords or unpatched software, provide multiple avenues to attack the network.
C . Weak firewall rule-sets make it easier for attackers to compromise the network.
D . There is no byproduct of weak defense-in-depth strategies.
Answer: B
Leave a Reply