IT Security: Defense against the digital dark arts. Week5: Defense in Depth Already Passed
What is an attack vector? a mechanism by which an attacker can interact with your network or systems; An attack vector can be thought of as any route through which an attacker can interact with your systems and potentially attack them. Disabling unnecessary components serves which purposes? Check all that apply. closing attack vectors reducing the attack surface; Every unnecessary component represents a potential attack vector. The attack surface is the sum of all attack vectors. So, disabling unnecessary components closes attack vectors, thereby reducing the attack surface. What's an attack surface? the combined sum of all attack vectors in a system or network; The attack surface describes all possible ways that an attacker could interact and exploit potential vulnerabilities in the network and connected systems. A good defense in depth strategy would involve deploying which firewalls? both host-based and network-based firewalls; Defense in depth involves multiple layers of overlapping security. So, deploying both host- and network-based firewalls is recommended. Using a bastion host allows for which of the following? Select all that apply applying more restrictive firewall rules enforcing stricter security measures running a wide variety of software securely having more detailed monitoring and logging applying more restrictive firewall ruleshaving more detailed monitoring and logging; Bastion hosts are special-purpose machines that permit restricted access to more sensitive networks or systems. By having one specific purpose, these systems can have strict authentication enforced, more firewall rules locked down, and closer monitoring and logging.
Written for
- Institution
- IT Security: Defense against the digital dark arts
- Module
- IT Security: Defense against the digital dark arts
Document information
- Uploaded on
- May 7, 2024
- Number of pages
- 5
- Written in
- 2023/2024
- Type
- Exam (elaborations)
- Contains
- Questions & answers
Subjects
-
it security defense against the digital dark arts