Which CORRECTLY pairs a security layer and an available technology in realizing the defense-in-depth principle?
A) Data security -- Access Control List (ACL) on border routers
B) Application security -- Hardening intermediary devices
C) Host security -- Anti-virus protection
D) Internal network security -- Corporate-wide data encryption
E) Perimeter security -- Network segmentation (e.g., subnets, VLANs)
Correct Answer:
Verified
Q1: The following technology solution represents an example
Q2: The following figure demonstrates the _ principle
Q4: Which is NOT a primary security requirement?
A)
Q5: _ is a process that validates "you
Q6: In realizing the defense-in-depth principle, the perimeter
Q7: The defense-in-depth principle may include security measures
Q8: The following elements/activities cut across all security
Q9: Maintaining a reliable backup system of corporate
Q10: Which of the following is NOT a
Q11: Maintaining data privacy achieves the _ aspect
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents