nerdexam
(ISC)2(ISC)2

CERTIFIED-IN-CYBERSECURITY · Question #132

CERTIFIED-IN-CYBERSECURITY Question #132: Real Exam Question with Answer & Explanation

The correct answer is A: Conceiving systems with duplicate components so that, if a failure occurs, there will be a backup. In cybersecurity, redundancy refers to conceiving systems for resilience with duplicate components so that, if a failure occurs, the redundant component will take over and maintain operations, thereby helping to prevent outages or other disruptions (see ISC2 Study Guide, chapter

Business Continuity (BC), Disaster Recovery (DR) & Incident Response Concepts

Question

What does redundancy mean in the context of cybersecurity?

Options

  • AConceiving systems with duplicate components so that, if a failure occurs, there will be a backup
  • BConceiving systems with only the most necessary components, so that the organization has just
  • CConceiving systems with less attack surface, so that the attacker has less chance of success
  • DDesigning systems with robust components, so that the organization has more attack resilience

Explanation

In cybersecurity, redundancy refers to conceiving systems for resilience with duplicate components so that, if a failure occurs, the redundant component will take over and maintain operations, thereby helping to prevent outages or other disruptions (see ISC2 Study Guide, chapter 4, module 3). Examples of this are redundant servers, redundant network links, and redundant power supplies. Redundancy is also effective against attacks, since the attacked nodes can be quarantined and then replaced by the backup.

Topics

#Redundancy#Fault Tolerance#High Availability#System Design

Community Discussion

No community discussion yet for this question.

Full CERTIFIED-IN-CYBERSECURITY PracticeBrowse All CERTIFIED-IN-CYBERSECURITY Questions