In a defense-in-depth approach, which three options must be identified to effectively defend a network against attacks?
1) Firewalls
2) Intrusion Detection Systems
3) Encryption
4) Antivirus Software
5) Access Control Lists