Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam CISSP All Questions

View all questions & answers for the CISSP exam

Exam CISSP topic 1 question 330 discussion

Actual exam question from ISC's CISSP
Question #: 330
Topic #: 1
[All CISSP Questions]

Which of the following BEST represents a defense in depth concept?

  • A. Network-based data loss prevention (DLP), Network Access Control (NAC), network-based Intrusion prevention system (NIPS), Port security on core switches
  • B. Host-based data loss prevention (DLP), Endpoint anti-malware solution, Host-based integrity checker, Laptop locks, hard disk drive (HDD) encryption
  • C. Endpoint security management, network intrusion detection system (NIDS), Network Access Control (NAC), Privileged Access Management (PAM), security information and event management (SIEM)
  • D. Web application firewall (WAF), Gateway network device tuning, Database firewall, Next-Generation Firewall (NGFW), Tier-2 demilitarized zone (DMZ) tuning
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
YesPlease
11 months, 1 week ago
Selected Answer: C
Answer C) I went with C because it was the only choice that spanned across different parts of a network. Although the other choices did do various layers of protection, they were aimed at protecting just one thing.
upvoted 1 times
...
Soleandheel
11 months, 2 weeks ago
C. is the correct answer. Defense in depth involves layering security controls across various levels, including endpoint, network, application, data, and physical layers. Option C provides a more comprehensive range of security measures that span multiple areas, making it a better representation of a defense in depth approach.
upvoted 1 times
...
shmoeee
1 year ago
Im going with C....originally thought B, but it doesn't provide countermeasures for network. B is only physical assets/endpoints
upvoted 1 times
...
isaac592
1 year, 1 month ago
Selected Answer: B
Defense in depth applies multiple safeguards to protect an asset. Went with B because it has different safeguards including a physical control to protect an endpoint/host.
upvoted 1 times
JBAnalyst
9 months, 2 weeks ago
When answering the questions , use this logic, is there an answer that encompasses another option. For exam , an end point manager would include a few things mentioned in B to protect the “asset” right?
upvoted 2 times
...
...
InclusiveSTEAM
1 year, 1 month ago
C is best representation of a defense-in-depth approach, which includes a mix of endpoint, network, monitoring, access management, and security intelligence controls. A defense-in-depth strategy involves layering diverse controls at different levels like endpoint, network, application, data, and physical layers. Option C provides the broadest range of complementary security tools spanning multiple areas. Option A focuses just on network protections. Option B focuses just on endpoint protections. Option D focuses just on perimeter protections.
upvoted 2 times
...
HughJassole
1 year, 5 months ago
B. It addresses defense at different levels. Cannot be C because a SIEM is not a defensive system but a monitoring system.
upvoted 2 times
...
Jamati
2 years ago
Selected Answer: C
C covers the endpoint devices, the network perimeter, IAM, and logging/monitoring
upvoted 4 times
jackdryan
1 year, 6 months ago
B is correct
upvoted 1 times
...
...
Jamati
2 years ago
C covers the endpoint devices, the network perimeter, IAM, and logging/monitoring
upvoted 2 times
...
Toyeeb
2 years, 1 month ago
Selected Answer: B
Defence indept is more than just the OSI or TCP/IP stack. It involves Protection at all level including physical protection and Administrative protection and not just the technical protection part.
upvoted 2 times
abb77
2 years ago
I think C is better. Options B only focused on endpoint security. Other aspects (layers) of the network needs to be covered in case there is endpoint breach
upvoted 6 times
...
...
franbarpro
2 years, 1 month ago
C is correct - Think about the OSI or TCP/IP Model. Defense in depth is the ability to provide security on each one of those 7 or 4 layers. That way if one is bypassed....we still have some defense on the next layer.
upvoted 3 times
Toyeeb
2 years, 1 month ago
Defence indept is more than just the OSI or TCP/IP stack. It involves Protection at all level including physical protection and Administrative protection and not just the technical protection part.
upvoted 5 times
...
...
ccmmaa
2 years, 1 month ago
B might be true, defense in depth is a combination of administrative, technical, and physical access controls, which means we need to have three different control, for physical control, we might only have Laptop locks for option B,
upvoted 3 times
oudmaster
1 year, 11 months ago
B is not defense in depth, because all the security controls are at endpoint layer. The controls should be at multiple layers (host and network).
upvoted 1 times
JohnyDal
1 year, 9 months ago
Defense in depth has three layers (Admin, Logical, Physical). OSI is a logical layer of the defense in depth. B seems to be a better option as it covers phyical and logical controls, most of the other options only cover logical controls.
upvoted 1 times
...
...
...
Vino22
2 years, 1 month ago
why not A ?
upvoted 1 times
oudmaster
1 year, 11 months ago
Port security on core switches or distribution switches should not be done. It should be on access switches only.
upvoted 2 times
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...