Refer to the exhibit.
Which associates labels A, B, C, and D with planes within the software-defined infrastructure.
What set of labels is correct?
Which concept ensures accountability for security breaches or misuse of resources?
Which host-based security attribute supports audit, multifactor authentication, and IP address filtering?
An administrator must design a fault-tolerant IT environment for applications.
Which techniques meet this requirement?