a. What is defense in depth? 5a.) An attacker must break through two firewalls to get to
Question:
a. What is defense in depth?
5a.) An attacker must break through two firewalls to get to a host. This illustrates the principle called ________. (Select the most specific answer.)
a. Comprehensive security
b. Risk assurance
c. Weakest link protection
d. Defense in depth
b. Why is defense in depth necessary?
5b.) Vulnerabilities are occasionally found in even the best security products. Consequently, companies must ________ . (Select the most specific answer.)
a. Have comprehensive security
b. Have defense in depth
c. Do risk analysis
d. Only give minimum permissions
c. When does a weakest link exist?
5c.) There is a single countermeasure in ________ .
a. Weakest links
b. Defense in depth
c. Both A and B
d. Neither A nor B
d. Distinguish between defense in depth and weakest links.
Step by Step Answer:
Business Data Networks and Security
ISBN: 978-0134817125
11th Edition
Authors: Raymond R. Panko, Julia L. Panko