Answer:
The three components used by defense in depth strategy are:
1) Physical controls
2) Technical controls
3) Adminstrative controls
Explanation:
Defense in depth is a strategy using multiple security measures to protect to protect the integrity of information. Today's cyberthreat are evolving and growing rapidly. Defense in depth is a solid, comprehensive approach to utilizing a combination of advanced security tools to protect critical data and block threats before they reach endpoint.
If one line of defense is compromised, additional layers of defense are in place to ensure that cracks don't slip through the cracks.
Defense in depth strategy uses three components which are:
* physical controls: are anything that physically limits or prevents access to IT systems. Examples are security guards and locked doors.
* Technical controls: are hardware or software whose purpose is to protect systems and resources. Examples are disk encryption, fingerprint readers and authentication.
* Adminstrative controls: are an organization's policies and procedures which ensures that there is proper guidance are available in regards to security and that regulations are met. Examples are hiring practices and data handling procedures.
Answer:
like this
Explanation:
<h3>you click answer and then<u>
<em> boom</em></u></h3>
If (sales >= 10000)
commission = 0.2;
Answer: If two different station are addressed with the same hardware address then there are chances of occurrence of the failure in the network at irregular intervals.The failure or error will occur because of the both the devices are seen as one by the network due to same address.
An intelligent network system id used ,it can identify the error can help in the prevention of the failure.Other option for configuring the situation is assigning the MAC(media access control)address to devices which are unique in nature thus, no device can have same address.