712-50 Exam QuestionsBrowse all questions from this exam

712-50 Exam - Question 57


Creating a secondary authentication process for network access would be an example of?

Show Answer
Correct Answer: AB

Creating a secondary authentication process for network access is an example of Defense in depth cost enumerated costs. Defense in depth is a strategy that involves multiple layers of security controls to protect information and resources. Implementing a secondary authentication adds an additional layer of security, enhancing the overall security posture by requiring multiple factors to authenticate users. This ensures that even if one layer of defense is compromised, other layers provide additional protection.

Discussion

6 comments
Sign in to comment
Otto_AulicinoOption: A
Dec 9, 2021

Each letter here seem to have more than one answer. This is either layered security or MFA or similar.

shay5Option: A
Feb 12, 2021

This is layered security.

TheProfezzorOption: A
Feb 8, 2024

A. Defense in depth, also referred to as Layered Security.

musagulOption: A
Feb 12, 2024

Correct answer is A

johndoe69Option: A
May 31, 2024

A. Defense in depth cost enumerated costs Defense in depth is a cybersecurity strategy that employs multiple layers of security controls (defenses) to protect information and resources. Implementing a secondary authentication process is a classic example of adding an additional layer of security, enhancing the overall security posture by requiring multiple factors to authenticate users. This approach ensures that even if one layer of defense (e.g., primary authentication) is compromised, other layers (e.g., secondary authentication) provide additional protection.

nshamsOption: A
Jul 13, 2024

sec authentication is an added sec feature underlying defense in depth concept