Which of the following is an example of the defense in-depth security principle?
A、Using two firewalls of different vendors to consecutively check the incoming network traffic
B、Using a firewall as well as logical access controls on the hosts to control incoming network traffic
C、Having no physical signs on the outside of a computer center building
D、Using two firewalls in parallel to check different types of incoming traffic