mitigation techniques and controls Flashcards

1
Q

_____ correspond to locations in the network that quietly discard (or “drop”) incoming or outgoing messages, without notifying the source that it did not reach its intended recipient.

A

Blackholes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

_____ indicates the physical isolation of a system from all network resources, often by being physically disconnected.

A

Air gapping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

_____ means suspicious traffic that is flooding a specific IP address routes to another network for analysis. This is a form of segmentation because it maintains the connection to other networks.

A

Sinkhole routing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

An _____ is a list of applications in an Access Control List with permission to run. Applications not found on the list cannot run. This often causes issues and results in more support calls and higher costs

A

allow list

How well did you know this?
1
Not at all
2
3
4
5
Perfectly