Which of the following is a technique to disrupt access to a system during an attack?

Get more with Examzify Plus

Remove ads, unlock favorites, save progress, and access premium tools across devices.

FavoritesSave progressAd-free
From $9.99Learn more

Prepare for the WGU ITAS6291 D488 Cybersecurity Architecture and Engineering exam. Use flashcards and multiple-choice questions, each with explanations and guidance. Master your knowledge and excel in your exam!

The technique that effectively disrupts access to a system during an attack is firewalls. Firewalls serve as a critical security barrier between trusted internal networks and untrusted external networks. They monitor and control incoming and outgoing network traffic based on predetermined security rules. When an attack is detected or suspicious activity occurs, firewalls can block access from malicious sources, thereby preventing attackers from successfully accessing or exploiting the system.

By controlling access and filtering traffic, firewalls can significantly mitigate the risk of unauthorized access and intrusion attempts, thereby protecting sensitive data and system integrity during an ongoing attack. This capability is vital for maintaining security in a constantly evolving threat landscape.

Access logs, hardening, and lighting each play important roles in cybersecurity but do not directly disrupt access during an attack. Access logs are used for monitoring and analysis post-incident, hardening involves securing a system’s configuration, and lighting refers to visibility in environments rather than an active security measure against attacks.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy