Which term is a defense in depth strategy?

Study for the CCST Cybersecurity Test. Study with flashcards and multiple choice questions, each question has hints and explanations. Get ready for your exam!

Multiple Choice

Which term is a defense in depth strategy?

Explanation:
Defense in depth is about using multiple security layers so that if one control fails, others still protect the system. Layering captures this approach: you deploy several independent protections—such as encryption to protect data, access controls to limit who can act, and monitoring to detect breaches—so threats must get through several barriers. This multiplicity reduces risk because each layer addresses different attack vectors and stages, making it harder for an attacker to succeed. Encryption is a specific protection for data confidentiality, but it’s just one layer. Monitoring is about detecting problems, which is important but not the overall strategy by itself. Access control restricts who can do what, another essential control but not the broad approach of combining multiple defenses.

Defense in depth is about using multiple security layers so that if one control fails, others still protect the system. Layering captures this approach: you deploy several independent protections—such as encryption to protect data, access controls to limit who can act, and monitoring to detect breaches—so threats must get through several barriers. This multiplicity reduces risk because each layer addresses different attack vectors and stages, making it harder for an attacker to succeed.

Encryption is a specific protection for data confidentiality, but it’s just one layer. Monitoring is about detecting problems, which is important but not the overall strategy by itself. Access control restricts who can do what, another essential control but not the broad approach of combining multiple defenses.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy