Technical Controls Flashcards

1
Q

Finch, a network administrator in the process of securing the internal network,
segregated the LAN creating an independent subnetwork. The newly created subnetwork
has been placed between the organization’s internal network and the outside public
network to enable high-level protection for the LAN.

Identify the independent network created by Finch in the above scenario to protect the
LAN.

A

DMZ
Demilitarized Zone
A computer subnetwork is placed between the organization’s private network such as a LAN, and an outside public network such as the Internet, and acts as an additional security layer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Identify the UBA tool that collects user activity details from multiple sources and uses artificial intelligence and machine learning algorithms to perform user behavior analysis to prevent and detect various threats before the fraud is perpetrated.

A

Dtex Systems

enables enterprise and federal entities to uplift their insider risk capability maturity to detect and prevent insider risks from materializing into data loss events. The team offers a comprehensive set of insider risk services, including investigation support and insider risk assessments, and publishes regular counter-insider risk research.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following components of VPN is used to manage tunnels and encapsulate private data?

A

VPN protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Kristen, a security professional, implements firewall in his organization to trace the
incoming and outgoing traffic. He deploys a firewall that works at the session layer of the
OSI model and monitors the TCP handshake between hosts to determine whether a
requested session is legitimate or not.

Identify the firewall technology implemented by Kristen in the above scenario.

A

Circuit-level gateways

How well did you know this?
1
Not at all
2
3
4
5
Perfectly