Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.

Unlimited Access

Get Unlimited Contributor Access to the all ExamTopics Exams!
Take advantage of PDF Files for 1000+ Exams along with community discussions and pass IT Certification Exams Easily.

Exam Cybersecurity Fundamentals Specialist topic 1 question 34 discussion

Actual exam question from ISA's Cybersecurity Fundamentals Specialist
Question #: 34
Topic #: 1
[All Cybersecurity Fundamentals Specialist Questions]

Which of the following is the BEST example of detection-in-depth best practices?

  • A. Firewalls and unexpected protocols being used
  • B. IDS sensors deployed within multiple zones in the production environment
  • C. Role-based access control and unusual data transfer patterns
  • D. Role-based access control and VPNs
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
ac873d6
1 month, 3 weeks ago
Selected Answer: B
Firewalls and Intrusion Detection Systems (IDS) should be configured to identify any traffic that is not part of the expected traffic across zones. IC32M page 54
upvoted 1 times
...
oortjes
2 months, 4 weeks ago
Is b not horizontal? more of the same. Role based acces is a control and a vpn is a control. two different controls. my guess is D
upvoted 1 times
CapibaraChris
3 weeks, 1 day ago
"Zones" can be vertical and horizontal, so my guess would also be B.
upvoted 1 times
...
...
Evan7557
7 months, 1 week ago
Answer B
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...