Which of the following might you find in a network that is based on a defense-in-depth security implementation?
Which of the following might you find in a network that is based on a defense-in-depth security implementation? (Choose all that apply.)
A. Firewall
B. IPS
C. Access lists
D. Current patches on servers
Correct Answer: ABCD