Which security methodology does this represent?
You plan to implement a security strategy and place multiple layers of defense throughout a network infrastructure.
Which security methodology does this represent?
A . threat modeling
B . identity as the security perimeter
C . defense in depth
D . the shared responsibility model
Answer: C
Explanation:
Reference: https://docs.microsoft.com/en-us/learn/modules/secure-network-connectivity-azure/2-what-is-defense-in-depth
Latest SC-900 Dumps Valid Version with 46 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund
Subscribe
Login
0 Comments
Inline Feedbacks
View all comments