In a defense-in-depth approach, which three options must be identified to effectively defend a network against attacks? (Choose three.)
- total number of devices that attach to the wired and wireless network
- assets that need protection
- vulnerabilities in the system
- location of attacker or attackers
- past security breaches
- threats to assets
Explanation: In order to prepare for a security attack, IT security personnel must identify assets that need to be protected such as servers, routers, access points, and end devices. They must also identify potential threats to the assets and vulnerabilities in the system or design.