Answer:
The main concept of the defense in depth is that the various defensive mechanism series are used for protecting the data and the information in the system. This approach is basically used multiple layers to control the cyber security. It also mainly provide the redundancy for controlling the security failure in the system.
The detection in depth basically provide the redundant overlapping approach and it is used for detecting the security and also accomplish the response that are available in the security detection.
Answer:

Explanation:
Router. A router is a networking device typically used to interconnect LANs to form a wide area network (WAN) and as such is referred to as a WAN device. IP routers use IP addresses to determine where to forward packets. An IP address is a numeric label assigned to each connected network device.
Fям:-
Answer:
It is bit { measurement used to quantify computer data. }
Yes definitely. now what do you need help with?
They are several weaknesses or disadvantages of file processing
systems but the major weakness is data redundancy and inconsistency. By data
redundancy, I mean duplication of data. There are no better methods to validate
insertion of duplicate data in file systems. Data redundancy can also increase
the chance for errors.