1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mariana [72]
4 years ago
10

ou work as network administrator for an organization that has a Windows-based network. You want to use multiple security counter

measures to protect the organization's information assets integrity. To accomplish the task, you need to implement multiple-layered security using the defense in depth strategy. Which three components does this strategy use?
Computers and Technology
1 answer:
kolezko [41]4 years ago
8 0

Answer:

The three components used by defense in depth strategy are:

1) Physical controls

2) Technical controls

3) Adminstrative controls

Explanation:

Defense in depth is a strategy using multiple security measures to protect to protect the integrity of information. Today's cyberthreat are evolving and growing rapidly. Defense in depth is a solid, comprehensive approach to utilizing a combination of advanced security tools to protect critical data and block threats before they reach endpoint.

If one line of defense is compromised, additional layers of defense are in place to ensure that cracks don't slip through the cracks.

Defense in depth strategy uses three components which are:

* physical controls: are anything that physically limits or prevents access to IT systems. Examples are security guards and locked doors.

* Technical controls: are hardware or software whose purpose is to protect systems and resources. Examples are disk encryption, fingerprint readers and authentication.

* Adminstrative controls: are an organization's policies and procedures which ensures that there is proper guidance are available in regards to security and that regulations are met. Examples are hiring practices and data handling procedures.

You might be interested in
.true or false? one disadvantage of cloudware is that it is never free<br> A. true<br> B. false
ser-zykov [4K]

Answer:

true

Explanation:

cloudware is used for many reasons and It is sometimes too much of an expense to the company

7 0
3 years ago
What is syntax?
kkurt [141]

Answer:

A

Explanation:

5 0
3 years ago
What is not a benefit of exploring tabs and groups in Microsoft Word?
MrRa [10]
Microsoft's<span> direct participation </span>not<span> only assures you that MOAC textbook content is accurate and current</span>
8 0
4 years ago
Read 2 more answers
What is the difference between hardware and software?
alina1380 [7]
A Hardware is any physical device used in. You can touch hardware, but you cannot touch software. Hardware is physical, and software is virtual. (brainliest) ??
4 0
3 years ago
Which of the following do you need to remeber about true/false questions?
lina2011 [118]
All parts of a statement must be true for it to be true
7 0
3 years ago
Other questions:
  • Choose the sentences that describe techniques of formatting text.
    12·1 answer
  • The most common type of local correction system is
    11·1 answer
  • Replmon is the first tool you should use when troubleshooting Active Directory replication issues. State True or False.
    12·1 answer
  • Describe any four rights of users of information systems.
    8·1 answer
  • As Juan sat in his biology lab, his instructor was droning on about the techniques of vivisection. Juan kept thinking about the
    5·1 answer
  • Today when Dylan turned on his computer, he noticed that the monitor was very dim. He could still see the desktop icon and text.
    15·1 answer
  • Identify traits of entrepreneurs. Check all of the boxes that apply.
    11·1 answer
  • Learning in a digital environment is also called [blank] learning.
    11·2 answers
  • (lesson 7.9: acceptance-rejection --- continuous examples.) consider the constant . on average, how many iterations (trials) wil
    6·1 answer
  • Identify the network and the host address in the ip address of 12.128.120.131 with a subnet mask of 255.128.0.0.
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!