_________ refers to the use of multiple, overlapping protection approaches addressing the people, technology, and operational aspects of information systems.
A) Layering
B) Modularity
C) Encapsulation
D) Open design
A) Layering
Computer Science & Information Technology
You might also like to view...
The ____ operating system is a free UNIX-like operating system that was created by Linus Torvalds.
A. BSD B. GNU C. System V D. Linux
Computer Science & Information Technology
In the figure above, the password is found on the General tab.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology