devaki is a network engineer. she is diagnosing an issue with a small business customers wireless local area network (wlan). she knows the institute of electrical and electronics engineers (ieee) has created the standards involved in various network technologies. while wlan standards cover a wide array of subsets, which general standard does she need to consult that addresses all vlans?

Respuesta :

Since Devaki is an engineer who is designing network security for her company's infrastructure. The type of protection  is called option A; Defense in depth.

What does defense-in-depth mean in cybersecurity?

The term Defense in Depth (DiD) is a term used to describe an information security strategy in which various security measures and controls are thoughtfully layered across a computer network to safeguard the privacy, availability, and integrity of the network and the data it contains.

Note that Defense in depth (DiD) is a cyber security tactic that employs a number of layered, redundant defensive measures to safeguard sensitive information, personally identifiable information (PII), and information technology assets. The following security layer prevents the potential cyberattack if one security measure fails.

Therefore, the term a defense-in-depth approach, also known as a security-in-depth approach, is a cybersecurity method that employs multiple layers of security for comprehensive protection. Organizations in the security industry can lessen vulnerabilities, contain threats, and manage risk by using layered defenses.

Learn more about Devaki From

https://brainly.com/question/29316552
#SPJ1

See full question below

Devaki is an engineer who is designing network security for her company's infrastructure. She is incorporating protections for programming flaws, default settings, maximum values, processing capabilities, and memory capacities on devices, as well as malicious code and social engineering. What is this type of protection called?

a) Defense in depth

b) Divide and conquer

c) Security through obscurity

d) Single point of failure avoidance