ARCHITECTURE & ENGINEERING EXAM 2026 |
VERIFIED QUESTIONS & CORRECT ANSWERS
WITH DETAILED RATIONALES | LATEST
UPDATED STUDY GUIDE
SANS SEC530: DEFENSIBLE SECURITY ARCHITECTURE & ENGINEERING
EXAM 2026 | VERIFIED QUESTIONS & CORRECT ANSWER WITH DETAILED
RATIONALE
LATEST UPDATED STUDY GUIDE
INSTRUCTIONS: Each question has 5 options (A–E). The CORRECT ANSWER is
highlighted with . The RATIONALE follows immediately after the CORRECT
ANSWER.
QUESTION 1
Which of the following best defines "Defensible Security Architecture"?
A. A security model that focuses solely on perimeter defenses
B. A framework that assumes breaches will occur and focuses on detection and
response
C. An architecture that relies entirely on signature-based detection
D. A model that eliminates all vulnerabilities before deployment
E. A system that focuses exclusively on endpoint protection
CORRECT ANSWER: B. A framework that assumes breaches will occur and
focuses on detection and response
RATIONALE: Defensible Security Architecture acknowledges that no system is
perfectly secure and that breaches are inevitable. It emphasizes building systems that
can detect intrusions, respond effectively, and minimize damage — rather than
assuming a perfect perimeter can prevent all attacks.
QUESTION 2
,What is the primary purpose of network segmentation in a defensible architecture?
A. To increase network speed across all segments
B. To reduce the number of firewalls needed
C. To limit lateral movement and contain breaches within defined zones
D. To simplify network management tasks
E. To eliminate the need for intrusion detection systems
CORRECT ANSWER: C. To limit lateral movement and contain breaches
within defined zones
RATIONALE: Network segmentation divides the network into isolated zones,
preventing attackers from freely moving laterally after gaining initial access. This
containment strategy is a core principle of defensible architecture, ensuring a
compromise in one zone does not cascade across the entire network.
QUESTION 3
Which concept describes the idea of assuming that attackers are already inside your
network?
A. Perimeter defense model
B. Zero Trust Architecture
C. Defense-in-depth
D. Threat intelligence sharing
E. Vulnerability management
CORRECT ANSWER: B. Zero Trust Architecture
RATIONALE: Zero Trust Architecture operates on the principle of "never trust, always
verify," assuming that threats exist both outside and inside the traditional network
perimeter. Every access request is authenticated and authorized regardless of its origin,
making it foundational to modern defensible security.
QUESTION 4
What does the principle of "least privilege" mean in the context of security architecture?
,A. Users should have the minimum number of passwords possible
B. Systems should run with the fewest services enabled
C. Users and systems should have only the access rights necessary to perform their
functions
D. Network traffic should be minimized to reduce attack surface
E. Security tools should use the least amount of system resources
CORRECT ANSWER: C. Users and systems should have only the access
rights necessary to perform their functions
RATIONALE: Least privilege restricts access rights for users, accounts, and
computing processes to only what is strictly required. This minimizes the potential
damage from accidents, errors, or unauthorized use, and limits an attacker's ability to
escalate privileges or access sensitive data.
QUESTION 5
Which of the following is a key characteristic of a Zero Trust network model?
A. Trust is granted based on network location
B. Implicit trust is given to internal network users
C. All traffic, internal and external, must be authenticated and authorized
D. Firewalls are the primary enforcement mechanism
E. VPN access automatically grants full network trust
CORRECT ANSWER: C. All traffic, internal and external, must be
authenticated and authorized
RATIONALE: Zero Trust removes the notion of a trusted internal network. Every
connection, whether from inside or outside the organization, must be explicitly
authenticated, authorized, and continuously validated before access is granted to
resources.
QUESTION 6
What is the role of a Security Information and Event Management (SIEM) system in
defensible architecture?
, A. To block malware at the endpoint level
B. To aggregate, correlate, and analyze security logs from multiple sources
C. To replace the need for firewalls in modern networks
D. To manage user access credentials
E. To encrypt data in transit across the network
CORRECT ANSWER: B. To aggregate, correlate, and analyze security logs
from multiple sources
RATIONALE: A SIEM collects and centralizes log data from across the environment,
correlates events to identify patterns indicative of attacks, and provides alerts for
security analysts. It is essential for visibility and is a cornerstone of detection-focused
defensible architecture.
QUESTION 7
Which framework is most commonly used to map adversary tactics, techniques, and
procedures (TTPs)?
A. NIST Cybersecurity Framework
B. ISO 27001
C. MITRE ATT&CK
D. COBIT
E. TOGAF
CORRECT ANSWER: C. MITRE ATT&CK
RATIONALE: MITRE ATT&CK is a globally accessible knowledge base of adversary
tactics and techniques based on real-world observations. It is widely used in threat
modeling, detection engineering, and red/blue team operations to understand and
counter attacker behavior.
QUESTION 8
What is the purpose of a demilitarized zone (DMZ) in network architecture?
A. To store encrypted backups of critical data