exam questions

Exam SY0-501 All Questions

View all questions & answers for the SY0-501 exam

Exam SY0-501 topic 1 question 82 discussion

Actual exam question from CompTIA's SY0-501
Question #: 82
Topic #: 1
[All SY0-501 Questions]

Which of the following is the BEST explanation of why control diversity is important in a defense-in-depth architecture?

  • A. Social engineering is used to bypass technical controls, so having diversity in controls minimizes the risk of demographic exploitation
  • B. Hackers often impact the effectiveness of more than one control, so having multiple copies of individual controls provides redundancy
  • C. Technical exploits to defeat controls are released almost every day; control diversity provides overlapping protection.
  • D. Defense-in-depth relies on control diversity to provide multiple levels of network hierarchy that allow user domain segmentation
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Hot_156
Highly Voted 4 years, 10 months ago
D is a good answer until you read this "that allow user domain segmentation"
upvoted 6 times
...
ban007
Most Recent 2 years ago
control diversity- overlapping protection= keyword
upvoted 1 times
...
boydmwanza
3 years, 9 months ago
If you have done networking, c makes sense
upvoted 1 times
...
monkeyyyyy
3 years, 10 months ago
Is it C or D? I hope I won't have this question in the real exam.
upvoted 2 times
...
DW_2020
4 years, 6 months ago
A and C refer to technical controls only, no other types i.e. not defense in depth. B is incorrect too as having multiple copies isnt DiD either. Defense in depth is having layers of different control types e.g. technical, physical, administrative etc. So that only really leaves D, although the domain segmentation is a bit offputting
upvoted 3 times
...
Hanzero
4 years, 7 months ago
I think it's C. D says domain segmentation which doesn't make sense in this context. Control diversity allows you to use different types of technical, administrative, and physical controls to add layers of protection.
upvoted 2 times
...
Teza
4 years, 8 months ago
Moderator, another one to correct
upvoted 3 times
...
kdce
4 years, 10 months ago
I believe C was answer, D too specific on only NW layered security
upvoted 3 times
...
Meredith
4 years, 11 months ago
C is the only answer that makes sense to me. Control diversity = using physical, administrative, technical controls, etc together to provide layered security or defense in depth. Overlapping protection is the goal, the other answers point too specifically to one aspect of defense.
upvoted 4 times
...
virtualwalker
4 years, 11 months ago
C: seems to be the best answer; "Control diversity is the use of different security control types, such as technical controls, administrative controls, and physical controls. For example, technical security controls such as firewalls, intrusion detection systems (IDSs), and proxy servers help protect a network. Physical security controls can provide extra protection for the server room or other areas where these devices are located. Administrative controls such as vulnerability assessments and penetration tests can help verify that these controls are working as expected."
upvoted 2 times
...
MelvinJohn
5 years, 1 month ago
C. A google search for "domain segmentation" and "control diversity" yielded zero results. But I did find the following information: Control diversity is the use of different security control types, such as technical controls, administrative controls, and physical controls. If one mechanism fails, another steps up immediately to thwart an attack. (Overlapping)
upvoted 1 times
...
Neela
5 years, 1 month ago
Correct answer D - Defence of depth relies on multiple layered security.. https://www.imperva.com/learn/application-security/defense-in-depth/
upvoted 1 times
Dante_Dan
5 years, 1 month ago
Well yes indeed relies on multilayered security, but not only network security. I think answer C is better.
upvoted 5 times
...
...
Zen1
5 years, 3 months ago
I think C is the answer. Defense-in-depth overlapping protection is most important.
upvoted 3 times
Zen1
5 years, 3 months ago
Besides the whole"network hierarchy to allow user domain segmentation" doesn't really make sense in this context.
upvoted 2 times
...
...
Jenkins3mol
5 years, 8 months ago
None of them is right. Too aspected.
upvoted 2 times
...
Basem
5 years, 8 months ago
I think it should be either C or D. I do not understand D. What does user domain segmentation mean?
upvoted 2 times
Moriarty
4 years, 11 months ago
If u do hash u can still crack it so its better to do salt with the hash...hence C is the correct answer.
upvoted 1 times
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago