Lesson 7: Infrastructure Security & Controls Flashcards
1
Q
A _____ is used to access and manage devices that are in another security zone from where a user belongs
A
jump box
2
Q
Sending logs to a _____ server or a _____ ensures that copies of the logs exist in a secure location
A
syslog , bastion host
3
Q
redirects traffic from its original destination to a destination of a user’s choice
A
Sinkholing
4
Q
provides continuous monitoring and response to advanced threats.
A
Endpoint detection and response (EDR)
5
Q
This defense splits a network into subnetworks where each subnetwork has different security and performance requirements. It is used to increase the efficiency of a network.
A
Segmentation