Fill in the blank: The five layers of the defense in depth model are: perimeter, network, endpoint, application, and _____.

Assets, Threats, and Vulnerabilities | Weekly challenge 3 Quiz | 

Fill in the blank: The five layers of the defense in depth model are: perimeter, network, endpoint, application, and _____.

  • session
  • transport
  • physical
  • data

 

Leave a Comment