1.  What is the concept of depth? What are the different kinds of layers that can be placed between an asset and unsecure network? 

2.  Is simply hiding vulnerabilities and other system architecture information a solid method of defense? What methods would you suggest? 

one page each with APA format.