contestada

Which of the following are good perimeter defenses employed in a defense in depth strategy?
a) Fences
b) Denial of service prevention
c) Firewalls
d) Network address translation