2.1 Enterprise Environment Security Flashcards
Which of the following should you implement to effectively collect these malicious payloads that the attackers are sending towards your systems without impacting your organization’s normal business operations?
A honeypot is a host set up to lure attackers away from the actual network components and/or discover attack strategies and weaknesses in the security configuration
Jumpbox
A jumpbox is a hardened server that provides access to other hosts
Sandbox
computing environment isolated from a host system to guarantee that the environment runs in a controlled, secure fashion
Containerization
type of virtualization applied by a host operating system to provide an isolated execution environment for an application
DNS blackholing
process that uses a list of known domains/IP addresses belonging to malicious hosts and uses an internal DNS server to create a fake reply
Route Poisoning
prevents networks from sending data somewhere when the destination is invalid
What filter don’t routers usually have?
Routers do not usually have an anti-malware filter, and this would be reserved for a unified threat management system