Which of the following is an example of defense in depth?

Get ready for your WGU ITEC2034 D385 Software Security and Testing Test. Study with multiple choice questions that include hints and explanations. Boost your confidence for your exam day!

Multiple Choice

Which of the following is an example of defense in depth?

Explanation:
Defense in depth means layering multiple security controls across different parts of the system so that if one control fails, others still stand between the attacker and the assets. The example covers many distinct controls across different stages of the security stack: input validation prevents malicious data from causing harm, authentication confirms who is trying to access the system, authorization enforces what each authenticated user is allowed to do, encryption protects data even if it’s accessed, logging provides visibility for detection and forensics, and network segmentation limits how far an intruder can move laterally. Together, these layers create multiple barriers that a threat must breach, reducing the chance of a successful attack. The other options rely on a single protective measure or remove essential protective capabilities, which is not sufficient for strong security. A single password policy doesn’t address other weaknesses or stages of an attack. Relying only on encryption leaves gaps in access control, input handling, and monitoring. Disabling monitoring eliminates the ability to detect and respond to incidents, undermining any security posture.

Defense in depth means layering multiple security controls across different parts of the system so that if one control fails, others still stand between the attacker and the assets.

The example covers many distinct controls across different stages of the security stack: input validation prevents malicious data from causing harm, authentication confirms who is trying to access the system, authorization enforces what each authenticated user is allowed to do, encryption protects data even if it’s accessed, logging provides visibility for detection and forensics, and network segmentation limits how far an intruder can move laterally. Together, these layers create multiple barriers that a threat must breach, reducing the chance of a successful attack.

The other options rely on a single protective measure or remove essential protective capabilities, which is not sufficient for strong security. A single password policy doesn’t address other weaknesses or stages of an attack. Relying only on encryption leaves gaps in access control, input handling, and monitoring. Disabling monitoring eliminates the ability to detect and respond to incidents, undermining any security posture.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy