What is a byproduct when defense-in-depth strategies are not applied to network architecture design?

What is a byproduct when defense-in-depth strategies are not applied to network architecture design?

Question:

What is a byproduct when defense-in-depth strategies are not applied to network architecture design?

Options:

An attacker will have a single point of entry into a system.

Weaknesses in the security posture, such as weak passwords or unpatched software, provide multiple avenues to attack the network.

Weak firewall rule-sets make it easier for attackers to compromise the network.

There is no byproduct of weak defense-in-depth strategies.

Correct Answer

The Correct Answer for this Question is

Weaknesses in the security posture, such as weak passwords or unpatched software, provide multiple avenues to attack the network.

Leave a Comment