nerdexam
(ISC)2(ISC)2

CERTIFIED-IN-CYBERSECURITY · Question #508

CERTIFIED-IN-CYBERSECURITY Question #508: Real Exam Question with Answer & Explanation

The correct answer is C: Assets. The concentric circle model of defense in depth places assets at the center. This model is designed to protect an organization's most valuable resources, its assets. Assets can be data, hardware, software, systems, or any other valuable resource. For example, in a bank, the asset

Security Principles

Question

What concept is at the center in the concentric circles model of defense in depth? ()

Options

  • APhysical Controls
  • BAdministrative Controls
  • CAssets
  • DLogical and/or Technical Controls

Explanation

The concentric circle model of defense in depth places assets at the center. This model is designed to protect an organization's most valuable resources, its assets. Assets can be data, hardware, software, systems, or any other valuable resource. For example, in a bank, the assets could be the customer's financial information, the bank's proprietary software, the servers where all the data is stored, and so on. The remaining options are incorrect because they are not at the center of the concentric circles model. Instead, they are layers of protection around the assets. Physical controls include measures such as locks, gates, and security guards; logical/technical controls include firewalls, antivirus software, and encryption; and administrative controls include policies, procedures, and training.

Topics

#Defense in Depth#Security Architecture#Cybersecurity Models#Asset Protection

Community Discussion

No community discussion yet for this question.

Full CERTIFIED-IN-CYBERSECURITY PracticeBrowse All CERTIFIED-IN-CYBERSECURITY Questions