100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

GSEC 401.2 Defense In Depth Exam With Complete Solutions Latest Update

Rating
-
Sold
-
Pages
21
Grade
A+
Uploaded on
10-11-2024
Written in
2024/2025

GSEC 401.2 Defense In Depth Exam With Complete Solutions Latest Update...

Institution
GSEC 401.2 Defense In Depth
Course
GSEC 401.2 Defense In Depth

Content preview

GSEC 401.2 Defense In Depth Exam With Complete
Solutions Latest Update


Inbound Network Traffic - ANSWER * Monitor Inbound network prevention



Outbound Network Traffic - ANSWER * Monitor Outbound network detection

* Majority of problems are outbound



defense in depth - ANSWER * Diversify to keep the vulnerabilities at a minimum



Risk (Formula) - ANSWER Threat x Vulnerability (to that threat)



Three TOP 20 Lists (Outbound Traffic) - ANSWER 1) Number Connections

2) Length of Connections

3) Amount of Data

------------------------

(High false positives, but increase the accuracy of Vulnerabilities)

4a) Percent of Encrypted Traffic

4b) Destination IP Address



Risk Analysis Questions - ANSWER * Before a company spends a dollar of it's money or
a minute of its time; answer the 3 questions

-------------

1) What is the *Risk*

2) Is it the *Highest Priority* risk

3) *Cost Effective* way of reducing the risk

,Top 5 List of Threats - ANSWER Critical Data and Process that support it

Likely Threats

Most likely Vulnerabilities



Questions for CEOs - ANSWER What are the things that worry you most?

What could cause you to be removed from the board?

What keeps you up at night?



Reduce Risk - ANSWER To reduce risk lets reduce Vulnerabilities



3 Goals of Security - ANSWER 1) Confidentiality / Disclosure

2) Integrity / Alteration

3) Availability / Destruction

Confidentiality vs Disclosure - ANSWER Only shared amongst authorized persons or
organisations

Integrity vs Alteration - ANSWER Authentic an complete.

Enough and Correct

Reliable and dependable

Availability vs Destruction - ANSWER Accessible when needed by whoever requires it

Network Visibility Tree - ANSWER * Segmentation per IP Address and Port

ex 10.0.0.X

/\

10.0.0.3 10.0.0.10

/|/|

23 110 5150 43 210 443

, Ports do not have to be utilized

4 methods of Defense In Depth - ANSWER 1) Uniform Protection

2) Protected Enclaves

3) Information Centric

4) Threat Vector Analysis

Uniform Protection - ANSWER 1) Most typical method to DiD

2) Firewall, VPN, Intrusion, Detection, Antivirus, Patching

3) All portions of the organization are provided with the exact amount of protection

4) All of the systems are treated the same



Protected Enclaves - ANSWER 1) Work groups needing extra protection are segregated
from the rest of the internal organization

2) Limit access to a critical segment

3) Internal Firewalls

4) VLANs and ACLs



Information Centric - ANSWER 1) Identify critical assets and layer protection for it

2) Applications access data

3) Applications run on hosts

4) Hosts run on networks



Vector-Oriented - ANSWER 1) The threat needs a vector to cross the vulnerability

2) Remove the ability of th threat to use the vector:

a) USB Thumb drives - Disable USB

b) Auto Answer Modems - Digital Phone PBX

Virus - ANSWER * Usually Target end users

* requires and executable

Written for

Institution
GSEC 401.2 Defense In Depth
Course
GSEC 401.2 Defense In Depth

Document information

Uploaded on
November 10, 2024
Number of pages
21
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Braxton West Virgina University
View profile
Follow You need to be logged in order to follow users or courses
Sold
66
Member since
2 year
Number of followers
45
Documents
2056
Last sold
1 hour ago

3.3

12 reviews

5
2
4
5
3
2
2
0
1
3

Trending documents

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions