Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

GSEC 401.2 Defense-In-Depth Exam Questions And Answers 2025 Update.

Beoordeling
-
Verkocht
-
Pagina's
13
Cijfer
A+
Geüpload op
10-03-2025
Geschreven in
2024/2025

©FYNDLAY 2024/2025 ALL RIGHTS RESERVED 1:52PM. 1 GSEC 401.2 Defense-In-Depth Exam Questions And Answers 2025 Update. What are 5 layers of Defense-in-depth security? - AnswerPerimeter Network Host Application Data What is risk? - AnswerRisk is the probability of a threat crossing or touching a vulnerability Formula for risk - AnswerThreats x Vulnerabilities = Risk CIA triad - AnswerConfidentiality, Integrity, Availability What is the foundation of defense-in-depth? - Answerfiltering Name 4 network filtering technologies - AnswerFirewalls Anti-DDoS Proxy servers Mail relays Name 2 host-based filtering technologies - AnswerAnti-malware software Application control What does a stateless firewall look at? - AnswerOnly look at the source and destination IP address of a network packet What does a stateful firewall look at? - AnswerNot only inspect the connection state of traffic but are also inspecting the contents of the packets and will drop packets that do not conform with the security policy of the environment ©FYNDLAY 2024/2025 ALL RIGHTS RESERVED 1:52PM. 2 Proxy definition - AnswerIntermediate systems that handle requests to resources on behalf of other systems Give 3 examples of proxys - AnswerMail relays Web application firewalls API gateways What are the 4 approaches to defense-in-depth? - AnswerUniform protection Protected enclaves Information-centric Vector-oriented Describe protected enclaves - AnswerAssets that require additional protection are segmented from the rest of the internal organization, and access to it is restricted. 2 techniques to create a protected enclave - AnswerVLANs (N)ACLs Describe vector-oriented defense-in-depth - AnswerInvolves identifying the various vectors that are employed by threats and providing security mechanisms to shut down those vectors. Name 2 factors that Zero-trust is based on. - AnswerAuthentication and encryption Name the 3 basic principles of zero-trust. - AnswerInternal/External threats will always exist Every user/device/network connection must be proven Log and inspect all network traffic Define variable trust - AnswerEnables you to dynamically change access for good or bad based on conditions. Name 4 conditions that can be used to change access in a variable trust environment - AnswerType of user access Geolocation Device compliancy Type of applicati

Meer zien Lees minder
Instelling
GSEC 401.2
Vak
GSEC 401.2

Voorbeeld van de inhoud

©FYNDLAY 2024/2025 ALL RIGHTS RESERVED 1:52PM.




GSEC 401.2 Defense-In-Depth Exam
Questions And Answers 2025 Update.



What are 5 layers of Defense-in-depth security? - Answer✔Perimeter
Network
Host
Application
Data

What is risk? - Answer✔Risk is the probability of a threat crossing or touching a vulnerability

Formula for risk - Answer✔Threats x Vulnerabilities = Risk

CIA triad - Answer✔Confidentiality, Integrity, Availability

What is the foundation of defense-in-depth? - Answer✔filtering

Name 4 network filtering technologies - Answer✔Firewalls
Anti-DDoS
Proxy servers
Mail relays

Name 2 host-based filtering technologies - Answer✔Anti-malware software
Application control

What does a stateless firewall look at? - Answer✔Only look at the source and destination IP
address of a network packet

What does a stateful firewall look at? - Answer✔Not only inspect the connection state of traffic
but are also inspecting the contents of the packets and will drop packets that do not conform
with the security policy of the environment


1

, ©FYNDLAY 2024/2025 ALL RIGHTS RESERVED 1:52PM.


Proxy definition - Answer✔Intermediate systems that handle requests to resources on behalf of
other systems

Give 3 examples of proxys - Answer✔Mail relays
Web application firewalls
API gateways

What are the 4 approaches to defense-in-depth? - Answer✔Uniform protection
Protected enclaves
Information-centric
Vector-oriented

Describe protected enclaves - Answer✔Assets that require additional protection are segmented
from the rest of the internal organization, and access to it is restricted.

2 techniques to create a protected enclave - Answer✔VLANs
(N)ACLs

Describe vector-oriented defense-in-depth - Answer✔Involves identifying the various vectors
that are employed by threats and providing security mechanisms to shut down those vectors.

Name 2 factors that Zero-trust is based on. - Answer✔Authentication and encryption

Name the 3 basic principles of zero-trust. - Answer✔Internal/External threats will always exist
Every user/device/network connection must be proven
Log and inspect all network traffic

Define variable trust - Answer✔Enables you to dynamically change access for good or bad
based on conditions.
Name 4 conditions that can be used to change access in a variable trust environment -
Answer✔Type of user access
Geolocation
Device compliancy
Type of application

Name 8 security components in an on-premise network - Answer✔Stateful firewall
Web App Firewall

2

Geschreven voor

Instelling
GSEC 401.2
Vak
GSEC 401.2

Documentinformatie

Geüpload op
10 maart 2025
Aantal pagina's
13
Geschreven in
2024/2025
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

$11.99
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
Fyndlay Kaplan University
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
402
Lid sinds
2 jaar
Aantal volgers
81
Documenten
19899
Laatst verkocht
4 dagen geleden
Scholar\'s Sanctuary.

Explore a Vast Collection of Finely Made Learning Materials.

3.7

72 beoordelingen

5
32
4
11
3
14
2
6
1
9

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen