Using routers, firewalls, and intrusion detection systems in combination with real-time human monitoring is an example of which of the following?

A. Separation of duties
B. Defense in depth
C. Principle of least privilege
D. Intrusion monitoring

Answer: B
Explanation: Defense in depth is also known as layered security and involves using overlapping layers of security to protect data and resources.

Computer Science & Information Technology

You might also like to view...

When you start a numbered list with "1" followed by period and a space, by default, Word will begin the next line with 2 when you press Enter

Indicate whether the statement is true or false

Computer Science & Information Technology

According to ________, many processes that access data and instructions once are likely to access them again in the future.

a) access patterns b) Moore’s Law c) spatial locality d) temporal locality

Computer Science & Information Technology