Question: a. What is defense in depth? 5a.) An attacker must break through two firewalls to get to a host. This illustrates the principle called ________.

a. What is defense in depth?

5a.) An attacker must break through two firewalls to get to a host. This illustrates the principle called ________. (Select the most specific answer.)

a. Comprehensive security

b. Risk assurance

c. Weakest link protection

d. Defense in depth


b. Why is defense in depth necessary?

5b.) Vulnerabilities are occasionally found in even the best security products. Consequently, companies must ________ . (Select the most specific answer.)

a. Have comprehensive security

b. Have defense in depth

c. Do risk analysis

d. Only give minimum permissions


c. When does a weakest link exist?

5c.) There is a single countermeasure in ________ .

a. Weakest links

b. Defense in depth

c. Both A and B

d. Neither A nor B


d. Distinguish between defense in depth and weakest links.

Step by Step Solution

3.43 Rating (166 Votes )

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock

a Requiring attackers to break through all countermeasures in a line of defenses to succe... View full answer

blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Business Data Networks Questions!