Secure Infrastructures 3.2 Flashcards

1
Q

Putting systems in specific places to increase security is called […]

Ex:
- Firewall separating trusted and untrusted networks
- Honeypots
- Sensors

A

Device Placement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

To provide more granular security, you can use area based security technologies called […]. This simplifies security policies

Untrusted VS Trusted
Internal VS External

A

Security Zones

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The […] of your network is everything that’s considered a vulnerability, and should be minimized to the best of your ability

A

Attack Surface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The […] of your network should be secure through the use of physical and logical solutions

  • Secure network cabling
  • Application level encryption
  • Network level encryption
A

Connectivity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly