Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Eccouncil Exam 212-89 Topic 4 Question 74 Discussion

Actual exam question for Eccouncil's 212-89 exam
Question #: 74
Topic #: 4
[All 212-89 Questions]

Shally, an incident handler, is working for a company named Texas Pvt. Ltd. based in

Florid

a. She was asked to work on an incident response plan. As part of the plan, she

decided to enhance and improve the security infrastructure of the enterprise. She has

incorporated a security strategy that allows security professionals to use several

protection layers throughout their information system. Due to multiple layer protection,

this security strategy assists in preventing direct attacks against the organization's

information system as a break in one layer only leads the attacker to the next layer.

Identify the security strategy Shally has incorporated in the incident response plan.

Show Suggested Answer Hide Answer
Suggested Answer: A

Shally has incorporated the Defense-in-depth strategy into the incident response plan for Texas Pvt. Ltd. Defense-in-depth is a layered security approach that involves implementing multiple security measures and controls throughout an information system. This strategy is designed to provide several defensive barriers to protect against threats and attacks, ensuring that if one layer is compromised, others still provide protection. The goal is to create a multi-faceted defense that addresses potential vulnerabilities in various areas, including physical security, network security, application security, and user education. Reference: The Incident Handler (ECIH v3) courses and study guides often emphasize the importance of a Defense-in-depth strategy in creating robust security infrastructures to protect against a wide range of cyber threats.


Contribute your Thoughts:

Norah
13 days ago
A) Defense-in-depth is the way to go. Gotta keep those pesky attackers on their toes with those multiple layers of security. Shally's doing it right!
upvoted 0 times
...
Milly
24 days ago
I also believe Defense-in-depth is the correct answer. It provides multiple layers of protection.
upvoted 0 times
...
Martha
26 days ago
I agree with Detra. Defense-in-depth is a great approach to enhance security infrastructure.
upvoted 0 times
...
Tyra
26 days ago
Haha, imagine if the answer was D) Exponential backoff algorithm. That would be like using a networking protocol to secure an entire information system. Gotta love these tricky exam questions!
upvoted 0 times
Arlette
7 days ago
User 3: Haha, yeah, that would be a strange choice for securing an information system!
upvoted 0 times
...
Ligia
9 days ago
User 2: Ligia is correct. Shally incorporated defense-in-depth in the incident response plan.
upvoted 0 times
...
Magnolia
13 days ago
User 1: A) Defense-in-depth
upvoted 0 times
...
...
Detra
27 days ago
I think the security strategy Shally has incorporated is Defense-in-depth.
upvoted 0 times
...
Juliann
1 months ago
Definitely A) Defense-in-depth. The question clearly describes the key characteristics of this strategy, like preventing direct attacks and having multiple layers of security.
upvoted 0 times
Ernest
3 days ago
Yes, that's correct. Defense-in-depth is all about having multiple layers of security.
upvoted 0 times
...
Dortha
13 days ago
A) Defense-in-depth
upvoted 0 times
...
...
Edna
1 months ago
I think the answer is A) Defense-in-depth. The question mentions that Shally has incorporated a security strategy with multiple layers of protection, which is the core concept of the defense-in-depth approach.
upvoted 0 times
Bette
18 days ago
B) Three-way handshake
upvoted 0 times
...
Jamey
19 days ago
Yes, you are correct. Shally has indeed incorporated a defense-in-depth security strategy.
upvoted 0 times
...
Maryrose
25 days ago
A) Defense-in-depth
upvoted 0 times
...
...

Save Cancel