Answer:
The main concept of the defense in depth is that the various defensive mechanism series are used for protecting the data and the information in the system. This approach is basically used multiple layers to control the cyber security. It also mainly provide the redundancy for controlling the security failure in the system.
The detection in depth basically provide the redundant overlapping approach and it is used for detecting the security and also accomplish the response that are available in the security detection.
Answer:
C. an example of open-source software.
Explanation:
open-source software is the type of software in which anyone can access, it can also be shared And modified by anyone simply because ita accessible to the public.
Hence and open source software's source code can be
inspected, enhanced and modified by anyone. A typical example is Linux.
Um maybe a glitch? Refresh your browser might help.