A hacker is trying to gain access to a company network which of the following scenarios would be an example of defense in depth
The company relies solely on a firewall to block unauthorized access
The company stores all sensitive data on a single server
The hacker is required to enter a username and password
None
Submit