I think the answer could be "Information Centric" since it focuses on the data being protected. But I remember there were nuances in each approach that make it tricky.
I feel like this is about "Uniform Protection," but I might be mixing it up with another concept. It's hard to keep all these terms straight sometimes.
This question reminds me of a practice test where we discussed blocking threats at different layers. I think it might be "Protected Enclaves," but I'm not completely confident.
I remember studying Defense in Depth, but I'm not entirely sure which approach this falls under. It seems like it could be related to protecting data, but I can't recall the specifics.
The key here is that the admin is using multiple security measures to protect the system. Blocking executable files is a good example of the Uniform Protection approach in Defense in Depth. I feel good about this one.
I'm a bit confused by the wording of the question. Is there something specific I'm missing about the different Defense in Depth approaches? I want to make sure I get this right.
Okay, I got this. Blocking executable files is a way to create protected enclaves and add multiple layers of security. I'm confident this is the right answer.
Clorinda
3 months agoJacqueline
3 months agoNatalie
3 months agoReena
4 months agoGlenn
4 months agoKeneth
4 months agoPaz
4 months agoAlesia
4 months agoBev
5 months agoErnest
5 months agoLino
5 months agoMelodie
5 months agoLakeesha
5 months agoCruz
5 months agoBrunilda
5 months agoDenise
5 months agoAshlyn
1 year agoVerda
1 year agoTrinidad
1 year agoYoulanda
1 year agoMartina
1 year agoJarod
1 year agoJohana
1 year agoReid
1 year agoAlonso
1 year agoUna
2 years agoVicki
1 year agoRupert
1 year agoRolland
1 year agoMaira
1 year agoArthur
1 year agoMatthew
1 year agoDorcas
1 year agoLinette
2 years agoShanda
1 year agoSamira
1 year agoKiley
1 year agoCorrina
2 years agoMartina
2 years ago