New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Eccouncil 212-89 Exam - Topic 3 Question 65 Discussion

Actual exam question for Eccouncil's 212-89 exam
Question #: 65
Topic #: 3
[All 212-89 Questions]

Shally, an incident handler, is working for a company named Texas Pvt. Ltd. based in

Florid

a. She was asked to work on an incident response plan. As part of the plan, she

decided to enhance and improve the security infrastructure of the enterprise. She has

incorporated a security strategy that allows security professionals to use several

protection layers throughout their information system. Due to multiple layer protection,

this security strategy assists in preventing direct attacks against the organization's

information system as a break in one layer only leads the attacker to the next layer.

Identify the security strategy Shally has incorporated in the incident response plan.

Show Suggested Answer Hide Answer
Suggested Answer: A

Shally has incorporated the Defense-in-depth strategy into the incident response plan for Texas Pvt. Ltd. Defense-in-depth is a layered security approach that involves implementing multiple security measures and controls throughout an information system. This strategy is designed to provide several defensive barriers to protect against threats and attacks, ensuring that if one layer is compromised, others still provide protection. The goal is to create a multi-faceted defense that addresses potential vulnerabilities in various areas, including physical security, network security, application security, and user education. Reference: The Incident Handler (ECIH v3) courses and study guides often emphasize the importance of a Defense-in-depth strategy in creating robust security infrastructures to protect against a wide range of cyber threats.


Contribute your Thoughts:

0/2000 characters
Salome
3 months ago
I don't think that's the only strategy out there, though.
upvoted 0 times
...
Elliot
3 months ago
Defense-in-depth is definitely the way to go for layered security!
upvoted 0 times
...
Melissa
3 months ago
Wait, is that really the right term? I thought it was something else.
upvoted 0 times
...
Leontine
4 months ago
Totally agree, that's the best way to secure systems.
upvoted 0 times
...
Shad
4 months ago
Sounds like she's using defense-in-depth!
upvoted 0 times
...
Elmira
4 months ago
I’m a bit confused. I thought the three-way handshake was more about establishing connections, not about security layers.
upvoted 0 times
...
Annamae
4 months ago
I feel like I’ve seen a question like this before, and I think the answer is A, defense-in-depth. It just makes sense with the layers mentioned.
upvoted 0 times
...
Bernadine
4 months ago
I'm not entirely sure, but I remember something about multiple layers being a key part of defense-in-depth.
upvoted 0 times
...
Ciara
5 months ago
I think the strategy Shally used is definitely defense-in-depth. It sounds familiar from our last practice exam.
upvoted 0 times
...
Kandis
5 months ago
Okay, let me think this through. The key details are the multiple layers of security and how a breach in one layer leads to the next. That sounds like the defense-in-depth strategy, so I'll go with that.
upvoted 0 times
...
Solange
5 months ago
Hmm, I'm a bit unsure about this one. The details about multiple layers of protection sound familiar, but I want to make sure I understand the concept correctly before answering.
upvoted 0 times
...
Hyman
5 months ago
This seems like a straightforward question about security strategies. I'm pretty confident I can identify the defense-in-depth approach described in the scenario.
upvoted 0 times
...
Elliott
5 months ago
Ah, I see what they're getting at now. The defense-in-depth approach is all about using multiple security controls to create depth and redundancy. That's the security strategy Shally has incorporated. I feel good about this answer.
upvoted 0 times
...
Brigette
5 months ago
This is a tricky one. I'm not entirely sure which lawful basis would be the primary one referenced in the privacy notice. I'll have to carefully consider each option before making a decision.
upvoted 0 times
...
Leeann
5 months ago
I feel pretty confident about this one. Based on my understanding, the programme team using a common language is crucial for aligning the work, so option A seems like the most likely threat.
upvoted 0 times
...
Andra
1 year ago
Haha, defense-in-depth? More like 'defense-in-depth pockets' for the IT budget! But hey, it's better than the 'defense-in-cardboard' strategy, am I right?
upvoted 0 times
...
Rebecka
1 year ago
Ooh, defense-in-depth! I bet Shally's got some fancy security tech to make those layers extra secure. Gotta keep those hackers at bay, am I right?
upvoted 0 times
...
Lizbeth
1 year ago
I'm with Chaya on this one. Defense-in-depth is the way to go. Shally's really stepping up her game to protect that Texas Pvt. Ltd. enterprise.
upvoted 0 times
...
Chaya
1 year ago
Defense-in-depth, of course! Layered security is the way to go, especially for an incident response plan. Gotta keep those pesky attackers on their toes.
upvoted 0 times
Yuriko
1 year ago
User1: Shally made a smart choice by incorporating defense-in-depth in the incident response plan.
upvoted 0 times
...
Sabrina
1 year ago
User2: Absolutely, having multiple layers of protection is crucial in preventing attacks.
upvoted 0 times
...
Sabrina
1 year ago
Defense-in-depth is definitely the way to go for security.
upvoted 0 times
...
Aleta
1 year ago
Defense-in-depth, of course! Layered security is the way to go, especially for an incident response plan. Gotta keep those pesky attackers on their toes.
upvoted 0 times
...
Berry
1 year ago
A) Defense-in-depth
upvoted 0 times
...
...
Erick
1 year ago
I'm not sure, but I think Defense-in-depth makes sense because it provides multiple layers of protection.
upvoted 0 times
...
Terina
1 year ago
I agree with Quentin, Defense-in-depth is the best option for enhancing security infrastructure.
upvoted 0 times
...
Quentin
1 year ago
I think the security strategy Shally has incorporated is Defense-in-depth.
upvoted 0 times
...

Save Cancel