CERTIFIED-IN-CYBERSECURITY · Question #776
CERTIFIED-IN-CYBERSECURITY Question #776: Real Exam Question with Answer & Explanation
The correct answer is A: Defense in depth. An organization that uses a layered approach when designing its security architecture is using a defense in-depth approach. In a defense in-depth approach, different layers of security controls may be implemented at different levels of the organization, such as at the network, ap
Question
An organization that uses a layered approach when designing its security architecture is using which of these security approaches?
Options
- ADefense in depth
- BNetwork Access Control
- CZero trust
- DNetwork Layers
Explanation
An organization that uses a layered approach when designing its security architecture is using a defense in-depth approach. In a defense in-depth approach, different layers of security controls may be implemented at different levels of the organization, such as at the network, application and user levels (see ISC2 Study Guide, chapter 4, module 3). Network Access Control refers to the process of controlling access to a network. Network layers refer to the different levels of a computer network, such as the network infrastructure, network applications and network devices. Zero trust is a security strategy which assumes that all network traffic is potentially malicious and requires verification.
Topics
Community Discussion
No community discussion yet for this question.