Which of the following is an example of the defense in-depth security principle? 
A、Using two firewalls of different vendors to consecutively check the incoming network traffic 
B、Using a firewall as well as logical access controls on the hosts to control incoming network traffic 
C、Having no physical signs on the outside of a computer center building 
D、Using two firewalls in parallel to check different types of incoming traffic 
							
