Multiple Choice
What is the principle of defense-in-depth?
A) Agentless and agent-based protection for security are used.
B) Several distinct protective layers are involved.
C) Access control models are involved.
D) Authentication, authorization, and accounting mechanisms are used.
Correct Answer:

Verified
Correct Answer:
Verified
Q29: Which utility blocks a host portscan?<br>A) HIDS<br>B)
Q30: What is the difference between an attack
Q31: What are the two characteristics of the
Q32: Which metric in CVSS indicates an attack
Q33: Which security technology guarantees the integrity and
Q35: Which regular expression matches "color" and "colour"?<br>A)
Q36: Which type of data collection requires the
Q37: How is NetFlow different than traffic mirroring?<br>A)
Q38: What is the practice of giving an
Q39: Which two elements are used for profiling