Which one of the following combinations of controls best embodies the defense in depth principle?

A. Encryption of email and network intrusion detection
B. Network firewall and host firewall
C. Cloud access security brokers (CASB) and security awareness training
E. Data loss prevention and multifactor authentication



Answer :

Other Questions