In a defense-in-depth approach, which three options must be identified to effectively defend a network against attacks? (Choose three.)
- assets that need protection
- location of attacker or attackers
- threats to assets
- total number of devices that attach to the wired and wireless network
- vulnerabilities in the system
- past security breaches
Answers Explanation & Hints:
In order to prepare for a security attack, IT security personnel must identify assets that need to be protected such as servers, routers, access points, and end devices. They must also identify potential threats to the assets and vulnerabilities in the system or design. |