+1 vote
in Software Architecture by (75.2k points)
Which of the following strategies include prevention,detection of threats?

(a) An authentication server may be placed outside users and the portion of the system that provides services

(b) Network monitors may be installed for the inspection and logging of network events

(c) The system may be placed behind a communications”firewall”

(d) All of the mentioned

The question was asked in examination.

The doubt is from System Quality Attributes Discernable At Runtime in chapter Architectural Patterns and Styles of Software Architecture

1 Answer

0 votes
by (46.2k points)
Correct choice is (d) All of the mentioned

Easiest explanation: All of the mentioned are correct strategies to prevent and detect threats.

Related questions

We welcome you to Carrieradda QnA with open heart. Our small community of enthusiastic learners are very helpful and supportive. Here on this platform you can ask questions and receive answers from other members of the community. We also monitor posted questions and answers periodically to maintain the quality and integrity of the platform. Hope you will join our beautiful community
...