Medium1 markMultiple Choice
Area II: SecuritySecurity ArchitectureDefense in Depth

CPA · Question 14 · Area II: Security

An organization uses a 'Defense in Depth' strategy. Which of the following represents a correct layering of controls from the perimeter inward?

Answer options:

A.

Database Encryption -> Firewall -> MFA

B.

Antivirus -> Firewall -> Biometric Access to Data Center

C.

Firewall -> Intrusion Prevention System (IPS) -> Host-based Antivirus -> File Encryption

D.

File Encryption -> Host-based Antivirus -> Firewall

How to approach this question

Visualize the path of an attacker from the internet to the data. What do they hit first?

Full Answer

C.Firewall -> Intrusion Prevention System (IPS) -> Host-based Antivirus -> File Encryption✓ Correct
C
Defense in Depth relies on layering controls. The typical order for a remote attack is: Network Perimeter (Firewall) -> Network Internal (IPS) -> Endpoint/Host (Antivirus/OS hardening) -> Data (Encryption).

Common mistakes

Confusing the order of network vs. host vs. data controls.

Practice the full CPA ISC Practice Exam 3

82 questions · hints · full answers · grading

More questions from this exam