A technology firm wants to protect sensitive research by adding controls across its network segments, hosts, and applications. Which approach would promote a thorough, multi-layer system?
Grant employees broad access privileges to reduce overhead and skip renewing expired certificates
Create a restricted section for vital resources and apply tight identity requirements backed by real-time log reviews
Focus on encryption for stored data on external media
Remove other controls and keep intrusion detection as a single measure
The correct approach integrates segmentation, strong credentials, and active surveillance. By separating key systems, tightening access rights, and monitoring events, attackers face multiple hurdles. Using a single measure, or focusing on limited encryption or wide access, can result in insufficient coverage at different points in the environment.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is network segmentation, and why is it important in security?
Open an interactive chat with Bash
What role does identity management play in a multi-layer security system?
Open an interactive chat with Bash
Why is real-time log monitoring essential for security?