An organization that purchased security products from different vendors in case an
attacker circumvented the Brand A device, yet would have more difficulty trying to break
through a Brand B device because they are different, is an example of __________.
a. obscurity
b. layering
c. limiting
d. diversity
Already registered? Login
Not Account? Sign up
Enter your email address to reset your password
Back to Login? Click here