Which of the following best describes the main idea behind the defense in depth strategy in cybersecurity?
Think about how multiple barriers work together to stop threats.
Defense in depth means using several layers of security controls so if one fails, others still protect the system.
Which of the following is NOT typically considered a layer in a defense in depth strategy?
Consider which option weakens security instead of strengthening it.
Ignoring software updates leaves systems vulnerable and is not part of defense in depth.
A company wants to protect its network using defense in depth. Which combination of measures best follows this strategy?
Think about combining technical, physical, and human controls.
Defense in depth combines multiple types of controls including technical, physical, and user awareness.
A company suffered a data breach because an attacker exploited a vulnerability in outdated software. Which defense in depth layer failed most directly?
Think about what prevents attackers from exploiting software weaknesses.
Patch management ensures software is updated to fix vulnerabilities, preventing exploits.
Why is defense in depth considered more effective than relying on a single security control?
Consider what happens if one security measure is breached.
Defense in depth uses multiple layers so a failure in one does not mean total compromise.