Domain 2 : Explain the purpose of migation techinques Flashcards

1
Q

Segementation

A

Its purpose is to compartmentalize the network, creating isolated segments that restrict the lateral movement of potential attackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Physical Segmentation

A

This method separates a network into smaller segments using routers, switches, and firewalls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

VLAN

A

VLANs create logical network segments within a single switch.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Subnetting

A

Subnetting divides an IP network into smaller subnetworks, each with a subnet mask.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

ACL

A

ACLs are lists used by routers and firewall devices to grant or deny network traffic based on a set of rules. There are two different kinds of ACLs, one for files and folders and another for incoming network traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Application Allow List

A

The application allow list has a clear purpose, which is to specify a roster of approved applications that are permitted to execute while blocking unauthorized or potentially malicious software from gaining a foothold.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Application Block list

A

An application block list, often referred to as a deny list, helps organizations enhance their network and data security by preventing specific applications from running

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Patching

A

The primary purpose of patching lies in fortifying systems and applications against security threats by applying regular updates and fixes, increasing their resilience to emerging vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Data sanitization

A

sanitization is the process of totally and irreversibly destroying data on a storage device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Telnet port

A

23! UNSECURE REMOTE ACESS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

SSH PORT

A

22

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

NETBIOS ports

A

137-139

Legacy file and print services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

EDR

A

EDR is a real-time solution that uses AI and ML technologies as part of their capabilities. This holistic cybersecurity solution is specifically crafted to oversee, identify, and react to security incidents and potential threats throughout an organization’s infrastructure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

SNMP port number

A

161

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Raid 5

A

3 disks
Parity

17
Q

Secure/Multipurpose Internet Mail Extensions (S/MIME

A

993

Encrypt or digitally sign email