Certified Ethical Hacker 312-50v10 – Question287

Which security strategy requires using several, varying methods to protect IT systems against attacks?


A.
Defense in depth
B. Covert channels
C. Exponential backoff algorithm
D. Three-way handshake

Correct Answer: A