100% tevredenheidsgarantie Direct beschikbaar na je betaling Lees online óf als PDF Geen vaste maandelijkse kosten 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

SANS SEC401 COMPREHENSIVE EXAMS QUESTIONS AND SOLUTIONS MARKED A+

Beoordeling
-
Verkocht
-
Pagina's
34
Cijfer
A+
Geüpload op
25-10-2025
Geschreven in
2025/2026

SANS SEC401 COMPREHENSIVE EXAMS QUESTIONS AND SOLUTIONS MARKED A+

Instelling
SANS SEC401
Vak
SANS SEC401











Oeps! We kunnen je document nu niet laden. Probeer het nog eens of neem contact op met support.

Geschreven voor

Instelling
SANS SEC401
Vak
SANS SEC401

Documentinformatie

Geüpload op
25 oktober 2025
Aantal pagina's
34
Geschreven in
2025/2026
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

Voorbeeld van de inhoud

SANS SEC401 COMPREHENSIVE EXAMS QUESTIONS AND
SOLUTIONS MARKED A+
✔✔Protected Enclaves - ✔✔An approach to defence-in-depth that involves segmenting
your network using multiple VPNs, VLAN segmentation, switches, or firewalls to
separate out networks. Reducing the exposure of a system can greatly reduce risk.
Restricting access to critical segments.

✔✔Information-centric - ✔✔An approach to defence-in-depth that you identify critical
assets and provide layered protection. Network -> Host -> Application -> Information.
Thoroughly checking the data leaving your network.

✔✔Vector-Oriented - ✔✔An approach to defense-in-depth in which the focus is on
preventing a threat from using a vector, such as malicious usb drives (disable usb),
email attachments (block or scan attachments), spoofed email (verify addresses)

✔✔Zero-Trust - ✔✔A different approach to defense-in-depth in which Every request,
regardless if internal or external, must be authenticated and authorized. This approach
is based on two key factors, authentication and encryption. Logging inspection is
essential.

✔✔Variable trust - ✔✔An implementation of zero trust model where the system scores a
trust level based on a number of factors. If you have a high enough score, then the user
is granted access. Factors include type of user access, correct username/password,
geo location, device compliancy, and type of application.

✔✔Web Application Firewall - ✔✔A special type of application-aware firewall that looks
at the applications using HTTP.

✔✔IAM - ✔✔Identity and access management

✔✔Azure IAM - ✔✔If/then rules allow the administrators to manage the system

✔✔AWS IAM - ✔✔Manages authorizations by policies, granular permissions. Can link
accounts with other platforms- google or Microsoft

✔✔GCP IAM - ✔✔Managed by group permission roles, members

✔✔Configuration Management - ✔✔The discipline of establishing a known baseline
condition and then managing that condition

✔✔Strategy for fixing an infected system - ✔✔Rebuild from scratch, never trust a
compromised system- start with a clean slate

,✔✔Digital Identity - ✔✔A set of data that uniquely describes a person or a thing.

✔✔Authorization - ✔✔The process of determining what a subject is allowed to do or
access after authentication

✔✔Authentication - ✔✔A process in which a subject proves they possess one or more
valid authenticators associated with an identity , includes three steps
1. Claimant presents authenticator to verifier
2. Verifier checks validity of authenticators
3. Verifier asserts the identity of the claimant

✔✔Accountability - ✔✔Process of identifying who did what on the system and when

✔✔identity management - ✔✔Organizational process for identifying, authenticating, and
authorizing individuals or groups of people to have access to applications, systems, or
networks by associating user rights and restrictions with established identities

✔✔Process of enrollment - ✔✔Identity proofing
Identity assurance level
Issuance of credentials

✔✔Identity proofing - ✔✔The process of proving that an applicant is who they claim to
be. Includes the following three steps...
1. Resolution (traveler giving passport to border agent, answering questions about
identity and purpose of travel.)
2. Validation (border agent inspection of passport to ensure it's not counterfeit)
3. Verification (border agent compares passport picture and data with the traveler)

✔✔IAL - ✔✔Identity assurance level .... level of confidence regarding an identity
Outlined in NIST 800-63

✔✔IAL 1 - ✔✔Self-asserted identity, not verified or validated

✔✔IAL 2 - ✔✔Evidence-based, verified by a credential service provider

✔✔IAL 3 - ✔✔Physical presence required for identity proofing

✔✔Authenticator Assurance Levels (3) - ✔✔AA1- Single factor at least
AA2- Any 2 factors plus strong crypto
AA3- Selected 2 factors plus strong crypto

✔✔Controlling access (4 steps) - ✔✔1. Least privilege
2. Need to know
3. Separation of duties

,4. Rotation of duties

✔✔Access control techniques (4) - ✔✔1. Discretionary Access Control, DAC
2. Mandatory Access Control, MAC
3. Role based Access Control, RBAC
4. Lattice based Access Control, LBAC

✔✔Discretionary Access Control (DAC) - ✔✔Control that the user can manage, such as
username, password and some file permissions

✔✔Mandatory Access Control (MAC) - ✔✔A type of control that applies to all resources
via system enforced credentials that are non transferable. MAC requires that all users
have clearance and all data have classification levels.

✔✔Role based access control (RBAC) - ✔✔a type of discretionary or mandatory access
control that assigns users to roles or groups based on organizational functions, each
group has authorization to to access certain resources

✔✔Lattice based access control ( LBAC) - ✔✔Mandatory access control that defines
restrictions on the interactions between subjects and objects. A subject can access an
object if the subject's security level is equal to or higher than the object.

✔✔Privileged Access - ✔✔Is access to a computer system with elevated access rights,
such as root or administrator, or access to service accounts

✔✔PAM - ✔✔Privileged Access management

✔✔PAM tools can do these 7 things - ✔✔1. Provide transparency to the user
2. Policy enforcement point
3. Generates strong shared secrets
4. Securely store credentials
5. Rotate credentials
6. Monitor and log privileged access
7. Generate reports

✔✔3 tiered Privileged Access Management - ✔✔Tier 0 - Active directory, critical and
secret servers (crown jewels)
Tier 1 - exchange servers, intranet servers
Tier 2 - user workstations, printers, mobile devices

✔✔Authentication types (3) - ✔✔Something you know (memorized password)
Something you have (token)
Something you are (fingerprint)

✔✔Strong password policy (4 do's) - ✔✔Length greater than 8

, Check for recognizable words or number sequences
Block after x failed attempts
Force change in case of suspected breach

✔✔Strong password policy (4 don't) - ✔✔Truncate passwords
Password hints
Force specific composition rules
Force periodic password changes

✔✔Storing passwords - ✔✔Clear text password -> Key derivation function-> hashed
password
Compare hashed password with the stored hashed password to authenticate

✔✔KDF - ✔✔Key derivation function

✔✔Characteristics of KDF (4) - ✔✔1. Irreversible hashing function
2. Input transformation, key stretching- so that keys can be in a specific format
3. Salt and pepper values, so that no two passwords can be the same before hashing
4. Difficulty factor - a value to intentionally make the hash more difficult to break, a value
of 10,000 means to repeat the has 10000 times before getting to the final hashed value

✔✔Salt and pepper values - ✔✔Salt is a string of random characters added to a
password before hashing it
Pepper is a salt that is kept secret and stored securely

✔✔What determines the strength of a password hash (4) - ✔✔1. Key derivation function
(KDF) quality
2. Password and derived key length
3. Character set support
4. Difficulty factor (CPU & GPU cycles needed to compute the password hash)

✔✔PBKDF2 - ✔✔Password-Based Key Derivation Function 2. A key stretching
technique that adds additional bits to a password as a salt. This method helps prevent
brute force and rainbow table attacks. Bcrypt is a similar key stretching technique.

✔✔Password dumps - ✔✔A list of hashed passwords that attackers reference

✔✔Password Cracking - general approach (5 steps) - ✔✔1. Obtain list of hashed
passwords
2. Determine the used KDF
3. Create list of possible password guesses
4. Calculate hashes for each guess
5. Try to match the hashes.

✔✔Password Cracking - 4 general methods - ✔✔1. Brute force attack

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
EXAMCAFE Chamberlain College Nursing
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
104
Lid sinds
10 maanden
Aantal volgers
3
Documenten
11120
Laatst verkocht
1 week geleden
EXAM CAFE

Welcome to Exam Docs Hub, the ultimate online destination for high-quality exam documents, study guides, and academic resources to help you excel in your studies! Whether you're preparing for final exams, standardized tests, certifications, or coursework, we provide comprehensive and well-structured materials to boost your confidence and performance. Our collection includes: ✅ Past exam papers for various subjects ✅ Study guides & summaries to simplify learning ✅ Practice tests & quizzes to assess your knowledge ✅ Detailed solutions & answer keys for effective revision At Exam Docs Hub, we prioritize accuracy, quality, and accessibility. Our resources are carefully curated to meet the needs of students, educators, and professionals. With instant downloads and user-friendly access,

Lees meer Lees minder
3,2

14 beoordelingen

5
5
4
2
3
2
2
1
1
4

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via Bancontact, iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo eenvoudig kan het zijn.”

Alisha Student

Veelgestelde vragen