1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nata [24]
3 years ago
14

Which term describes an approach to security similar to defense in depth in that it supports multiple layers, but uses a differe

nt security mechanism at each or most of the layers?
Computers and Technology
1 answer:
miss Akunina [59]3 years ago
3 0

Answer:

The answer to this question is Diversity of Defense.

Explanation:

Diversity of defense:- It is an approach for security which supports multiple layers but the catch here is that at each layer a different mechanism of security is used or at most of the layers.The idea is that you do not need to have multiple layers of defense but different defenses also.  

So we conclude that the answer to this question is Diversity in Defense.

You might be interested in
What method of research deals with large amounts of information that is analyzed and presented statistically?
Alenkinab [10]
Method of research deals with large amounts of information that is analyzed and presented statistically is quantitate.
6 0
3 years ago
The shortcut key combination to cut text is. Ctrl+C Ctrl+X Shift+V Shift+Y​
Gemiola [76]

Answer:

Ctrl + X

Explanation:

5 0
4 years ago
Read 2 more answers
After hacking into atm systems remotely using a laptop, What attacker worked with the atm manufacturers to resolve the identifie
Aneli [31]

grey hat hackers are those after hacking into ATM systems remotely using a laptop, works with the ATM manufacturers to resolve the identified security vulnerabilities

  • A grey hat hacker is simply known as an hacker that falls between the range of black and white hacker. They are known to illegally break into systems so as to show off their skills to the administrator of the system they penetrated or to seek to sell their services in repairing security breaches.

  • In the ATM case, they attacked it and then also want the ATM manufacturer to use their service.

Conclusively we can therefore say that the hacker was a gray hat hacker.

Learn more from

brainly.com/question/15899195

3 0
3 years ago
Pls help ASAP I’ll brainlest
goldenfox [79]

Answer:

Trash#7519 for discord loser

Explanation:

8 0
3 years ago
Which of the following describes evolution in the SDLC model?
stira [4]

Completing the requirements analysis is the evolutionary step of the Software development life cycle (SDLC). Hence option 3

<h3>What is the software development life cycle?</h3>

The SDLC is a method for evaluating and improving the development process. It enables a fine-grained study of each process phase. As a result, firms are able to maximize efficiency at each level.

SDLC aids in the achievement of these objectives by detecting inefficiencies and increased costs and resolving them so that everything runs smoothly.

Thus, Initial needs and architecture planning must be completed and are considered as an evolution in the SDLC model

Learn more about SDLC:

brainly.com/question/26366977

#SPJ1

4 0
2 years ago
Other questions:
  • For a panoramic photograph, you will more than likely want to control the exposure of the photograph yourself rather than lettin
    11·1 answer
  • Outputting all combinations. Output all combinations of character variables a, b, and c using this ordering abc acb bac bca cab
    7·1 answer
  • From Blown to Bits why is it important to know what children are doing on the Web Tonight?
    7·1 answer
  • write a program in C# that reads a set of integers and then finds and prints the sum of the even and odd integers?​
    12·1 answer
  • Three reasons why users attach speakers to their computer
    8·1 answer
  • Digital computers use a........ system to encode date and programs.<br>​
    8·1 answer
  • List out any four hardware and software components required for multimedia​
    10·1 answer
  • Peyton is having trouble searching for information on butter lettuce. Every time he searches for it, he gets some results for bu
    6·2 answers
  • 5.23 LAB: Contains the character
    8·1 answer
  • USE PYTHON TURTLE GRAPHICS
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!