Secure Infrastructures 3.2 Flashcards
1
Q
Putting systems in specific places to increase security is called […]
Ex:
- Firewall separating trusted and untrusted networks
- Honeypots
- Sensors
A
Device Placement
2
Q
To provide more granular security, you can use area based security technologies called […]. This simplifies security policies
Untrusted VS Trusted
Internal VS External
A
Security Zones
3
Q
The […] of your network is everything that’s considered a vulnerability, and should be minimized to the best of your ability
A
Attack Surface
4
Q
The […] of your network should be secure through the use of physical and logical solutions
- Secure network cabling
- Application level encryption
- Network level encryption
A
Connectivity