Western Governors University (WGU) ITAS2110 D430 Fundamentals of Information Security Practice Exam

Session length

1 / 20

What are the layers in a defense-in-depth strategy?

External network, software, users

External network, internal network, host, application, data

The layers in a defense-in-depth strategy are designed to provide multiple levels of protection, ensuring that if one layer fails, additional layers continue to provide security. The correct choice encompasses the various components that contribute to a robust security posture.

In this case, the components include the external network, where threats may originate from outside the organization; the internal network, which is further protected from external threats; the host layer, which secures individual devices; the application layer, where vulnerabilities in software can be addressed; and the data layer, which focuses on protecting sensitive information itself. This multi-layered approach not only helps to detect and thwart potential attacks but also acts as a way to control access and safeguard critical assets.

Each of these layers plays a unique role in mitigating different types of risks, reinforcing the overall security framework, and promoting a comprehensive understanding of potential vulnerabilities throughout the entire system. This holistic approach is key to ensuring thorough security within an organization's infrastructure.

Get further explanation with Examzify DeepDiveBeta

Users, application, physical environment

Application, user, geographical

Next Question
Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy