Get Unlimited Contributor Access to the all ExamTopics Exams!
Take advantage of PDF Files for 1000+ Exams along with community discussions and pass IT Certification Exams Easily.
D. Implement network segmentation to achieve robustness.
Network segmentation is a security practice that involves dividing a network into smaller, isolated subnetworks, which can limit the potential damage and spread of an attack. This can prevent an attacker from disabling the entire network, and it can also provide additional security controls such as access controls, firewalls, and intrusion detection/prevention systems (IDS/IPS) to further protect critical network assets.
Designing networks with the ability to adapt, reconfigure, and fail over can also help to maintain network availability in the face of an attack, but network segmentation is considered the most effective way to prevent an attacker from disabling the entire network. Testing business continuity and disaster recovery (DR) plans and following security guidelines to prevent unauthorized network access are important, but they are not directly related to preventing an attacker from disabling the network.
I think the correct answer is A. We are asked about strategy - design networks in a proper way is a strategy. Moreover, C tells us about guidelines to prevent access only, but the question is about disabling network in general.
A. I think the key is that it says "prevent an attacker" instead of talking about maintaining availability during an attack. That's why I think it's C instead of A.
Designing networks with adaptability, reconfigurability, and failover mechanisms enhances their resilience and ensures continuity of services even in the face of attacks or disruptions. This approach makes it more difficult for an attacker to disable the network by introducing redundancy and alternative paths.
The answer is A
The most effective strategy to prevent an attacker from disabling a network is to design networks with adaptability, reconfigurability, and failover capabilities, option A.
Building resiliency into the network architecture provides the greatest protection against total denial of service. The network can recover and adapt.
Testing DR plans, following security guidelines, and segmentation are beneficial but alone don't prevent full denial if the design is still fragile.
While comprehensive security is crucial, a brittle design leaves no options if endpoints are still compromised. Resilient architecture assumes breaches may occur.
C. Because A and B are reactive, not preventive. D is not going to prevent disabling the network assuming the attacker got into a VLAN and performed other attacks, such as VLAN hopping and etc...
C. Because A and B are not reactive, not preventive. D is not going to prevent disabling the network assuming the attacker got into a VLAN and performed other attacks, such as VLAN hopping and etc...
Option C, "Follow security guidelines to prevent unauthorized network access," is indeed an important strategy to enhance network security. By following security guidelines and implementing measures such as strong access controls, secure authentication mechanisms, and intrusion detection systems, organizations can prevent unauthorized network access and reduce the risk of network compromise.
However, in the context of preventing an attacker from disabling a network, implementing network segmentation (Option D) is generally considered a more effective strategy. Network segmentation helps isolate different parts of the network, limiting the impact of a potential breach or attack.
While following security guidelines is crucial for overall network security, it may not provide the same level of protection against network disabling as network segmentation. It is important to implement a combination of security measures, including network segmentation, access controls, monitoring, and regular security updates, to safeguard against various threats and ensure the availability and integrity of the network.
always, it is never a one approach to perfection
A. In my CISSP class the instructor stressed that security must be baked in. This answer talks about designing the network to be resilient right away. I think A encompasses the others, but also with D, I don't think segmentation makes the network robust. It just makes it so if I get access to the main network, I can't log into any server. If I get access to non-prod, I still can't log into anything in prod.
A. Design networks with the ability to adapt, reconfigure, and fail over.
Designing networks with the ability to adapt, reconfigure, and fail over is the most effective strategy to prevent an attacker from disabling a network. This approach ensures that if one part of the network is compromised, the rest of the network can continue to function without interruption. This approach also helps to prevent a single point of failure, which can make it more difficult for an attacker to bring down the network.
Testing business continuity and disaster recovery (DR) plans is also important, as it helps to ensure that the organization can quickly recover from a network outage or other disruptive event. Following security guidelines to prevent unauthorized network access and implementing network segmentation to achieve robustness are also important strategies for improving network security. However, these strategies alone may not be enough to prevent an attacker from disabling a network.
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
Dee83
Highly Voted 1 year, 3 months agoDtony66
Most Recent 1 day, 7 hours agoCCNPWILL
2 weeks, 1 day agoVasyamba1
1 month, 1 week agoCCNPWILL
2 weeks, 1 day agohomeysl
1 month, 2 weeks agoKyanka
1 month, 4 weeks agogjimenezf
3 months, 3 weeks agoSoleandheel
4 months, 4 weeks agoAMANSUNAR
5 months, 2 weeks agoInclusiveSTEAM
6 months, 3 weeks agoaape1
7 months agoaape1
7 months agoBach1968
10 months agoHughJassole
10 months, 2 weeks agoGoseu
12 months agojackdryan
11 months, 4 weeks agoNageshTiwari
1 year agoChao333
1 year ago