Tools of Defense #2 Flashcards

1
Q

Defense in depth

A

A security discipline that refers to having layers of protection in an IT infrastructure.

It’s intent is to provide redundancy in the event a security control fails or a vulnerability is exploited.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Policies, Procedures, & Awareness:

A

Published policies, implemented security procedures, and trained employees.

PERIMETER
INTERNAL NETWORK
HOST
APPLICATION
DATA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

PERIMETER

A

A firewall to prevent unauthorized access to the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

INTERNAL NETWORK

A

Software or hardware tools that scan the network for attackers and traffic that shouldn’t be there.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

HOST

A

The Individual computers on the network, running antivirus.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

APPLICATION

A

Correct configurations, securely written code, and access privileges.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

DATA

A

Encrypting confidential data, or password protecting databases.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Social Engineering Indicators (SEI)

A

A feature of KnowBe4’s simulated phishing campaigns that shows a user the red flags they missed when clicking on a link in a simulated phishing campaign.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Artificial Intelligence Driven Agent (AIDA)

A

A tool that uses AI to automatically create integrated campaigns that send emails, text, and voicemail to an employee, simulating a multi-vector social engineering attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly