exam questions

Exam 312-50v12 All Questions

View all questions & answers for the 312-50v12 exam

Exam 312-50v12 topic 1 question 134 discussion

Actual exam question from ECCouncil's 312-50v12
Question #: 134
Topic #: 1
[All 312-50v12 Questions]

Given the complexities of an organization’s network infrastructure, a threat actor has exploited an unidentified vulnerability, leading to a major data breach. As a Certified Ethical Hacker (CEH). you are tasked with enhancing the organization's security stance. To ensure a comprehensive security defense, you recommend a certain security strategy. Which of the following best represents the strategy you would likely suggest and why?

  • A. Develop an in-depth Risk Management process, involving identification, assessment, treatment, tracking, and review of risks to control the potential effects on the organization.
  • B. Establish a Defense-in-Depth strategy, incorporating multiple layers of security measures to increase the complexity and decrease the likelihood of a successful attack.
  • C. Implement an Information Assurance (IA) policy focusing on ensuring the integrity, availability, confidentiality, and authenticity of information systems.
  • D. Adopt a Continual/Adaptive Security Strategy involving ongoing prediction, prevention, detection, and response actions to ensure comprehensive computer network defense.
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
insaniunt
Highly Voted 10 months, 3 weeks ago
Selected Answer: D
D. Organizations should adopt adaptive security strategy, which involves implementing all the four network security approaches: Protection, Detection, Responding and Prediction The adaptive security strategy consists of four security activities corresponding to each security approach - page 53 from ceh v12 book
upvoted 7 times
...
e020fdc
Most Recent 1 month, 2 weeks ago
Selected Answer: B
I thought D, but ChatGPT says B. Idk what EC Councils wants. "In the scenario, a threat actor exploited an unknown vulnerability (i.e., a zero-day or unidentified weakness), which led to a major data breach. This indicates that a single point of failure was likely exploited. The most effective countermeasure against such scenarios is to layer security controls, so that if one control fails, others are still in place to prevent or mitigate the attack. This is exactly what Defense-in-Depth provides."
upvoted 1 times
...
qtygbapjpesdayazko
9 months, 3 weeks ago
Selected Answer: D
D. Adopt a Continual/Adaptive Security Strategy involving ongoing prediction, prevention, detection, and response actions to ensure comprehensive computer network defense
upvoted 1 times
...
[Removed]
10 months, 3 weeks ago
Could someone help me confirm the accuracy of this data
upvoted 1 times
...
pechuga
10 months, 4 weeks ago
It is D
upvoted 1 times
...
smoce
11 months ago
Selected Answer: B
they are in. B sounds like the best option.
upvoted 1 times
...
cloudgangster
11 months ago
Selected Answer: D
It is D, pg 54 ceh v12
upvoted 4 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...