Assets, Threats, and Vulnerabilities | Weekly challenge 3 Quiz |
Which layer of the defense in depth model relates to user devices that have accessed a network?
- Perimeter
- Endpoint
Data- Application
Assets, Threats, and Vulnerabilities | Weekly challenge 3 Quiz |
Which layer of the defense in depth model relates to user devices that have accessed a network?