2.1 Enterprise Environment Security Flashcards

1
Q

Which of the following should you implement to effectively collect these malicious payloads that the attackers are sending towards your systems without impacting your organization’s normal business operations?

A

A honeypot is a host set up to lure attackers away from the actual network components and/or discover attack strategies and weaknesses in the security configuration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Jumpbox

A

A jumpbox is a hardened server that provides access to other hosts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Sandbox

A

computing environment isolated from a host system to guarantee that the environment runs in a controlled, secure fashion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Containerization

A

type of virtualization applied by a host operating system to provide an isolated execution environment for an application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

DNS blackholing

A

process that uses a list of known domains/IP addresses belonging to malicious hosts and uses an internal DNS server to create a fake reply

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Route Poisoning

A

prevents networks from sending data somewhere when the destination is invalid

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What filter don’t routers usually have?

A

Routers do not usually have an anti-malware filter, and this would be reserved for a unified threat management system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly