An organization implements multiple security controls at different layers of its IT infrastructure. This approach exemplifies the ____________ strategy.
- Defense-in-Depth
- Least Privilege
- Security Through Obscurity
- Zero Trust
The defense-in-depth strategy involves implementing multiple layers of security controls to protect against various types of cyber threats. This approach recognizes that no single security measure is foolproof, and a combination of defenses is needed to create a robust security posture. Understanding and implementing defense-in-depth is fundamental for building resilient and comprehensive cybersecurity strategies.__________________________________________________
Loading...
Related Quiz
- A cybersecurity team employs AI to analyze patterns and predict potential security breaches, demonstrating the application of ____________ in threat intelligence.
- How does the BGP (Border Gateway Protocol) function in the Internet?
- Which of the following best describes the primary purpose of a certificate authority (CA) in the SSL/TLS handshake process?
- In an advanced security audit, what is the purpose of 'threat modeling'?
- What is the primary advantage of using a biometric authentication method, such as fingerprint or facial recognition?