(ISC)2 Certified in Cybersecurity Practice Exam

Disable ads (and more) with a membership for a one time $2.99 payment

Prepare for the (ISC)2 Certified in Cybersecurity Exam with comprehensive quizzes and extensive question banks. Enhance your skills with detailed explanations and practice tests designed to improve your expertise for the certification exam. Get exam-ready now!

Each practice test/flash card set has 50 randomly selected questions from a bank of over 500. You'll get a new set of questions each time!

Practice this question and more.


What information security strategy integrates people, technology, and operations to establish security barriers?

  1. Layered Security

  2. Defense in Depth

  3. Multi-Layered Protection

  4. Holistic Security Strategy

The correct answer is: Defense in Depth

The term "Defense in Depth" refers to a comprehensive information security strategy that employs multiple layers of defense across physical, technical, and administrative controls. The concept is predicated on the idea that a successful security posture cannot rely on a single security measure; rather, it must integrate various overlapping techniques that create "barriers" to potential threats. This strategy recognizes that threats can emerge from multiple vectors—such as external attackers, insider threats, and even unintentional actions by users. By implementing layered defenses, organizations can slow down or deter an attack, providing additional time to detect and respond to security incidents. Each layer serves a distinct function and utilizes different technologies, policies, and practices, ensuring there are several hurdles a threat must overcome before achieving its objective. Other options may incorporate elements of security but don't provide the same comprehensive and strategic approach to integrating people, technology, and operations. For example, "Layered Security" is technically similar but may not emphasize the holistic integration aspect as strongly as "Defense in Depth." "Multi-Layered Protection" tends to emphasize the number of layers rather than the effective integration of those layers into a cohesive strategy. "Holistic Security Strategy" suggests a more encompassing view but does not specifically convey the structured, tier