Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam 312-50v12 All Questions

View all questions & answers for the 312-50v12 exam

Exam 312-50v12 topic 1 question 134 discussion

Actual exam question from ECCouncil's 312-50v12
Question #: 134
Topic #: 1
[All 312-50v12 Questions]

Given the complexities of an organization’s network infrastructure, a threat actor has exploited an unidentified vulnerability, leading to a major data breach. As a Certified Ethical Hacker (CEH). you are tasked with enhancing the organization's security stance. To ensure a comprehensive security defense, you recommend a certain security strategy. Which of the following best represents the strategy you would likely suggest and why?

  • A. Develop an in-depth Risk Management process, involving identification, assessment, treatment, tracking, and review of risks to control the potential effects on the organization.
  • B. Establish a Defense-in-Depth strategy, incorporating multiple layers of security measures to increase the complexity and decrease the likelihood of a successful attack.
  • C. Implement an Information Assurance (IA) policy focusing on ensuring the integrity, availability, confidentiality, and authenticity of information systems.
  • D. Adopt a Continual/Adaptive Security Strategy involving ongoing prediction, prevention, detection, and response actions to ensure comprehensive computer network defense.
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
insaniunt
Highly Voted 9 months, 2 weeks ago
Selected Answer: D
D. Organizations should adopt adaptive security strategy, which involves implementing all the four network security approaches: Protection, Detection, Responding and Prediction The adaptive security strategy consists of four security activities corresponding to each security approach - page 53 from ceh v12 book
upvoted 6 times
...
qtygbapjpesdayazko
Most Recent 8 months, 2 weeks ago
Selected Answer: D
D. Adopt a Continual/Adaptive Security Strategy involving ongoing prediction, prevention, detection, and response actions to ensure comprehensive computer network defense
upvoted 1 times
...
[Removed]
9 months, 2 weeks ago
Could someone help me confirm the accuracy of this data
upvoted 1 times
...
pechuga
9 months, 2 weeks ago
It is D
upvoted 1 times
...
smoce
9 months, 2 weeks ago
Selected Answer: B
they are in. B sounds like the best option.
upvoted 1 times
...
cloudgangster
9 months, 2 weeks ago
Selected Answer: D
It is D, pg 54 ceh v12
upvoted 4 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...