Certified Ethical Hacker – CEH – 312-50 – Question202

Which security strategy requires using several, varying methods to protect IT systems against attacks?


A.
Defense in depth
B. Three-way handshake
C. Covert channels
D. Exponential backoff algorithm

Correct Answer: A