October 2019
Intermediate to advanced
374 pages
13h 10m
English
1. Which of the following is the best description of the defense-in-depth strategy?
Hiding protected resources behind multiple firewalls
Using multiple layers of security controls to protect resources
Fully securing the most important resources first
Staying current on as many known attacks as possible
2. What is the main goal of information security?
Protect information from unauthorized use
Catch as many unauthorized users as possible
Protect information from unauthorized modification
Stop anonymous users from accessing information
3. Does turning off a computer make the information it contains secure?
Yes, because no unauthorized user can access information on a computer that is turned off.
No, because the ...
Read now
Unlock full access