_________ refers to the use of multiple, overlapping protection approaches addressing the people, technology, and operational aspects of information systems.

A) Layering
B) Modularity
C) Encapsulation
D) Open design

A) Layering

Computer Science & Information Technology

You might also like to view...

The ____ operating system is a free UNIX-like operating system that was created by Linus Torvalds.

A. BSD B. GNU C. System V D. Linux

Computer Science & Information Technology

In the figure above, the password is found on the General tab.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology