IT Security: Defense against the digital dark arts - Defense in Depth - Week 5 Already Passed
IT Security: Defense against the digital dark arts - Defense in Depth - Week 5 Already Passed What is an attack vector? A mechanism by which an attacker can interact with your network or systems Disabling unnecessary components serves which purposes? Check all that apply. Reducing the attack surface, closing attack vectors What's an attack surface? The combined sum of all attack vectors in a system or network A good defense in depth strategy would involve deploying which firewalls? Both host-based and network-based firewalls Using a bastion host allows for which of the following? Applying more restrictive firewall rules, having more detailed monitoring and logging, enforcing stricter security measures What benefits does centralized logging provide? It allows for easier logs analysis, it helps secure logs from tampering or destruction What are some of the shortcomings of antivirus software today? It cant protect against unknown threats How is binary whitelisting a better option than antivirus software? It can block unknown or emerging threats What does full-disk encryption protect against? Data theft, Tampering with system files
Written for
- Institution
- IT SECURITY
- Module
- IT SECURITY
Document information
- Uploaded on
- April 15, 2024
- Number of pages
- 4
- Written in
- 2023/2024
- Type
- Exam (elaborations)
- Contains
- Questions & answers
Subjects
-
it security defense against the digital dark arts
Also available in package deal