nerdexam
(ISC)2(ISC)2

CERTIFIED-IN-CYBERSECURITY · Question #776

CERTIFIED-IN-CYBERSECURITY Question #776: Real Exam Question with Answer & Explanation

The correct answer is A: Defense in depth. An organization that uses a layered approach when designing its security architecture is using a defense in-depth approach. In a defense in-depth approach, different layers of security controls may be implemented at different levels of the organization, such as at the network, ap

Security Principles

Question

An organization that uses a layered approach when designing its security architecture is using which of these security approaches?

Options

  • ADefense in depth
  • BNetwork Access Control
  • CZero trust
  • DNetwork Layers

Explanation

An organization that uses a layered approach when designing its security architecture is using a defense in-depth approach. In a defense in-depth approach, different layers of security controls may be implemented at different levels of the organization, such as at the network, application and user levels (see ISC2 Study Guide, chapter 4, module 3). Network Access Control refers to the process of controlling access to a network. Network layers refer to the different levels of a computer network, such as the network infrastructure, network applications and network devices. Zero trust is a security strategy which assumes that all network traffic is potentially malicious and requires verification.

Topics

#Defense in Depth#Security Architecture#Layered Security#Security Principles

Community Discussion

No community discussion yet for this question.

Full CERTIFIED-IN-CYBERSECURITY PracticeBrowse All CERTIFIED-IN-CYBERSECURITY Questions