__________ is a strategy for the protection of information assets that uses multiple layers and different types of controls (managerial, operational, and technical) to provide optimal protection.
A. Networking
B. Proxy
C. Defense in depth
D. Best-effort
Answer: C
Computer Science & Information Technology
You might also like to view...
A computer's storage media can hold hundreds of thousands of files
Indicate whether the statement is true or false
Computer Science & Information Technology
A(n) ____________________ is an audio file that is distributed through downloads or the use of a feed.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology