__________ is a strategy of using multiple types of technology that prevent the failure of one system from compromising the security of information.
A) Firewalling
B) Hosting
C) Redundancy
D) Domaining
Correct Answer:
Verified
Q64: The spheres of security are the foundation
Q65: The transfer of large batches of data
Q66: A(n) _ is a document containing contact
Q67: A _ site provides only rudimentary services
Q68: In early 2014, in response to Executive Order
Q70: The transfer of transaction data in real
Q71: _ controls cover security processes that are
Q72: Security _ are the areas of trust
Q73: _ controls address personnel security, physical security,
Q74: SP 800-14, Generally Accepted Principles and Practices
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents