Which three options are a result of utilizing a fragmented security model? (Choose three.)
Which three options are a result of utilizing a fragmented security model? (Choose three.)
A . individual components pieced together that are incompatible
B . multiple points of access that can be exploited by cyber criminals
C . additional fragmentation that reduces the risk from malicious files
D . decreased network accessibility through multiple applications
E . patchworked applications that continually increase in complexity
F . fragmented security that provides disbursed protection
Answer: CDF
Explanation:
https://www.cisco.com/c/en/us/products/collateral/security/whitepaper_c11-733368.html
Subscribe
Login
0 Comments
Inline Feedbacks
View all comments