What is a byproduct when defense-in-depth strategies are not applied to network architecture design?

Posted by: Pdfprep Category: 210-250 Tags: , ,

What is a byproduct when defense-in-depth strategies are not applied to network architecture design?
A . An attacker will have a single point of entry into a system.
B . Weaknesses in the security posture, such as weak passwords or unpatched software, provide multiple avenues to attack the network.
C . Weak firewall rule-sets make it easier for attackers to compromise the network.
D . There is no byproduct of weak defense-in-depth strategies.

Answer: B

Leave a Reply

Your email address will not be published.