Week 5 – Defense in Depth Post author:Devendra Kumar Post published: Post comments:0 Comments it security defense against the digital dark arts week 5 answers System Hardening 1. What is an attack vector? Answers The classification of attack typeThe direction an attack is going inA mechanism by which an attacker can interact with your network or systemsThe severity of the attack 2. Disabling unnecessary components serves which purposes? Check all that apply. Answers Closing attack vectorsIncreasing performanceMaking a system harder to useReducing the attack surface 3. What's an attack surface? Answers The total scope of an attackThe payload of the attackThe combined sum of all attack vectors in a system or networkThe target or victim of an attack 4. A good defense in depth strategy would involve deploying which firewalls? Answers No firewallsBoth host-based and network-based firewallsNetwork-based firewalls onlyHost-based firewalls only 5. Using a bastion host allows for which of the following? Select all that apply. Answers Enforcing stricter security measuresHaving more detailed monitoring and loggingApplying more restrictive firewall rulesRunning a wide variety of software securely 6. What benefits does centralized logging provide? Check all that apply. Answers It blocks malware infections.It prevents database theft.It allows for easier logs analysis.It helps secure logs from tampering or destruction. 7. What are some of the shortcomings of antivirus software today? Check all that apply. Answers It can’t protect against unknown threats.It only detects malware, but doesn’t protect against it.It’s very expensive.It only protects against viruses. 8. How is binary whitelisting a better option than antivirus software? Answers It can block unknown or emerging threats.It has less performance impact.It’s cheaper.It’s not better. It’s actually terrible. 9. What does full-disk encryption protect against? Check all that apply. Answers Data theft Malware infectionsTampering with system filesIP spoofing attacks 10. What's the purpose of escrowing a disk encryption key? Answers Providing data integrityPreventing data theftPerforming data recoveryProtecting against unauthorized access Next Please Share This Share this content Opens in a new window Opens in a new window Opens in a new window Opens in a new window Opens in a new window Opens in a new window Opens in a new window Opens in a new window Opens in a new window Opens in a new window Opens in a new window Devendra Kumar Project Management Apprentice at Google You Might Also Like Week 1 – The Fundamentals Of Agile – Shuffle Q/A 2 Practice Quiz: Managing Collaboration Leave a Reply Cancel replyCommentEnter your name or username to comment Enter your email address to comment Enter your website URL (optional) Save my name, email, and website in this browser for the next time I comment.