Which security strategy requires using several, varying methods to protect IT systems against attacks?
A. Defense in depth
B. Covert channels
C. Exponential backoff algorithm
D. Three-way handshake
A. Defense in depth
B. Covert channels
C. Exponential backoff algorithm
D. Three-way handshake