GSEC 401.2 Defense-In-Depth Exam
Questions And Answers 2025 Update.
What are 5 layers of Defense-in-depth security? - Answer✔Perimeter
Network
Host
Application
Data
What is risk? - Answer✔Risk is the probability of a threat crossing or touching a vulnerability
Formula for risk - Answer✔Threats x Vulnerabilities = Risk
CIA triad - Answer✔Confidentiality, Integrity, Availability
What is the foundation of defense-in-depth? - Answer✔filtering
Name 4 network filtering technologies - Answer✔Firewalls
Anti-DDoS
Proxy servers
Mail relays
Name 2 host-based filtering technologies - Answer✔Anti-malware software
Application control
What does a stateless firewall look at? - Answer✔Only look at the source and destination IP
address of a network packet
What does a stateful firewall look at? - Answer✔Not only inspect the connection state of traffic
but are also inspecting the contents of the packets and will drop packets that do not conform
with the security policy of the environment
1
, ©FYNDLAY 2024/2025 ALL RIGHTS RESERVED 1:52PM.
Proxy definition - Answer✔Intermediate systems that handle requests to resources on behalf of
other systems
Give 3 examples of proxys - Answer✔Mail relays
Web application firewalls
API gateways
What are the 4 approaches to defense-in-depth? - Answer✔Uniform protection
Protected enclaves
Information-centric
Vector-oriented
Describe protected enclaves - Answer✔Assets that require additional protection are segmented
from the rest of the internal organization, and access to it is restricted.
2 techniques to create a protected enclave - Answer✔VLANs
(N)ACLs
Describe vector-oriented defense-in-depth - Answer✔Involves identifying the various vectors
that are employed by threats and providing security mechanisms to shut down those vectors.
Name 2 factors that Zero-trust is based on. - Answer✔Authentication and encryption
Name the 3 basic principles of zero-trust. - Answer✔Internal/External threats will always exist
Every user/device/network connection must be proven
Log and inspect all network traffic
Define variable trust - Answer✔Enables you to dynamically change access for good or bad
based on conditions.
Name 4 conditions that can be used to change access in a variable trust environment -
Answer✔Type of user access
Geolocation
Device compliancy
Type of application
Name 8 security components in an on-premise network - Answer✔Stateful firewall
Web App Firewall
2