Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

GSEC 401.2 Defense in Depth Exam Guide GRADED A

Beoordeling
-
Verkocht
-
Pagina's
14
Cijfer
A
Geüpload op
11-11-2024
Geschreven in
2024/2025

Inbound Network Traffic -Correct Answer * Monitor Inbound network prevention Outbound Network Traffic -Correct Answer * Monitor Outbound network detection * Majority of problems are outbound defense in depth -Correct Answer * Diversify to keep the vulnerabilities at a minimum Risk (Formula) -Correct Answer Threat x Vulnerability (to that threat) Three TOP 20 Lists (Outbound Traffic) -Correct Answer 1) Number Connections 2) Length of Connections 3) Amount of Data ------------------------ (High false positives, but increase the accuracy of Vulnerabilities) 4a) Percent of Encrypted Traffic 4b) Destination IP Address Risk Analysis Questions -Correct Answer * Before a company spends a dollar of it's money or a minute of its time; answer the 3 questions ------------- 1) What is the *Risk* 2) Is it the *Highest Priority* risk 3) *Cost Effective* way of reducing the risk Top 5 List of Threats -Correct Answer Critical Data and Process that support it Likely Threats Most likely Vulnerabilities Questions for CEOs -Correct Answer What are the things that worry you most? What could cause you to be removed from the board? What keeps you up at night? Reduce Risk -Correct Answer To reduce risk lets reduce Vulnerabilities 3 Goals of Security (CIA Triad) -Correct Answer 1) Confidentiality / Disclosure 2) Integrity / Alteration 3) Availability / Destruction Confidentiality vs Disclosure -Correct Answer Only shared among authorized persons or organisations Integrity vs Alteration -Correct Answer Authentic an complete. Sufficient and Accurate Trustworthy and reliable Availability vs Destruction -Correct Answer Accessible when needed by those who need it Network Visibility Tree -Correct Answer * Breakdown by IP Address and Port ex 10.0.0.X / 10.0.0.3 10.0.0.10 / | / | 443 * Identify unnecessary use of ports 4 approaches to Defense In Depth -Correct Answer 1) Uniform Protection 2) Protected Enclaves 3) Information Centric 4) Threat Vector Analysis Uniform Protection -Correct Answer 1) Most common approach to DiD 2) Firewall, VPN, Intrusion, Detection, Antivirus, Patching 3) All parts of the organization receive equal protection 4) Treats all the systems the same Protected Enclaves -Correct Answer 1) Work groups that require additional protection are segmented from the rest of the internal organization 2) Restricting access to critical segments 3) Internal Firewalls 4) VLANs and ACLs Information Centric -Correct Answer 1) Identify critical assets and provide layered protection 2) Data is accessed by applications 3) Applications reside on hosts 4) Hosts operate on networks Vector-Oriented -Correct Answer 1) The threat requires a vector to cross the vulnerability 2) Stop the ability of th threat to use the vector: a) USB Thumb drives - Disable USB b) Auto Answer Modems - Digital Phone PBX

Meer zien Lees minder
Instelling
GSEC 401.2
Vak
GSEC 401.2

Voorbeeld van de inhoud

GSEC 401.2 Defense In Depth



GSEC 401.2 Defense in Depth Exam
Guide 2024-2025 GRADED A
Inbound Network Traffic -Correct Answer ✔* Monitor Inbound network prevention

Outbound Network Traffic -Correct Answer ✔* Monitor Outbound network detection
* Majority of problems are outbound

defense in depth -Correct Answer ✔* Diversify to keep the vulnerabilities at a minimum

Risk (Formula) -Correct Answer ✔Threat x Vulnerability (to that threat)

Three TOP 20 Lists (Outbound Traffic) -Correct Answer ✔1) Number Connections
2) Length of Connections
3) Amount of Data
------------------------
(High false positives, but increase the accuracy of Vulnerabilities)
4a) Percent of Encrypted Traffic
4b) Destination IP Address

Risk Analysis Questions -Correct Answer ✔* Before a company spends a dollar of it's
money or a minute of its time; answer the 3 questions
-------------
1) What is the *Risk*
2) Is it the *Highest Priority* risk
3) *Cost Effective* way of reducing the risk

Top 5 List of Threats -Correct Answer ✔Critical Data and Process that support it
Likely Threats
Most likely Vulnerabilities

Questions for CEOs -Correct Answer ✔What are the things that worry you most?
What could cause you to be removed from the board?
What keeps you up at night?

Reduce Risk -Correct Answer ✔To reduce risk lets reduce Vulnerabilities

3 Goals of Security (CIA Triad) -Correct Answer ✔1) Confidentiality / Disclosure
2) Integrity / Alteration
3) Availability / Destruction

Confidentiality vs Disclosure -Correct Answer ✔Only shared among authorized persons
or organisations


GSEC 401.2 Defense In Depth

, GSEC 401.2 Defense In Depth



Integrity vs Alteration -Correct Answer ✔Authentic an complete.
Sufficient and Accurate
Trustworthy and reliable

Availability vs Destruction -Correct Answer ✔Accessible when needed by those who
need it

Network Visibility Tree -Correct Answer ✔* Breakdown by IP Address and Port
ex 10.0.0.X
/\
10.0.0.3 10.0.0.10
/|\/|\
23 110 5150 43 210 443

* Identify unnecessary use of ports

4 approaches to Defense In Depth -Correct Answer ✔1) Uniform Protection
2) Protected Enclaves
3) Information Centric
4) Threat Vector Analysis

Uniform Protection -Correct Answer ✔1) Most common approach to DiD
2) Firewall, VPN, Intrusion, Detection, Antivirus, Patching
3) All parts of the organization receive equal protection
4) Treats all the systems the same

Protected Enclaves -Correct Answer ✔1) Work groups that require additional protection
are segmented from the rest of the internal organization
2) Restricting access to critical segments
3) Internal Firewalls
4) VLANs and ACLs

Information Centric -Correct Answer ✔1) Identify critical assets and provide layered
protection
2) Data is accessed by applications
3) Applications reside on hosts
4) Hosts operate on networks

Vector-Oriented -Correct Answer ✔1) The threat requires a vector to cross the
vulnerability
2) Stop the ability of th threat to use the vector:
a) USB Thumb drives - Disable USB
b) Auto Answer Modems - Digital Phone PBX



GSEC 401.2 Defense In Depth

Geschreven voor

Instelling
GSEC 401.2
Vak
GSEC 401.2

Documentinformatie

Geüpload op
11 november 2024
Aantal pagina's
14
Geschreven in
2024/2025
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

$15.99
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
PossibleA Chamberlain College Of Nursing
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
1037
Lid sinds
5 jaar
Aantal volgers
650
Documenten
13550
Laatst verkocht
4 dagen geleden
POSSIBLEA QUALITY UPDATED EXAMS

Choose quality study materials for nursing schools to ensure success in your studies and future career. "Welcome to PossibleA - your perfect study assistant! Here you will find Quality sheets, study materials, exams, quizzes, tests, and notes to prepare for exams and study successfully. Our store offers a wide selection of materials on various subjects and difficulty levels, created by experienced teachers and checked for quality. Our quality sheets are an easy and quick way to remember key points and definitions. And our study materials, tests, and quizzes will help you absorb the material and prepare for exams. Our store also has notes and lecture summaries that will help you save time and make the learning process more efficient.

Lees meer Lees minder
3.9

148 beoordelingen

5
77
4
25
3
22
2
1
1
23

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen