Module 05 Challenge: Defense in Depth Quiz Answers

Get IT Security: Defense Against The Digital Dark Arts Graded Quiz Answers

Q1. A hacker gained access to a network through malicious email attachments. Which one of these is important when talking about methods that allow a hacker to gain this access?

Answer: An attack vector

Explanation: An attack vector is the pathway or method used by a hacker to access a system, such as malicious email attachments in this case.


Q2. What are Bastion hosts?

Answer: Servers that are specifically hardened and minimized to reduce what's permitted to run on them.

Explanation: Bastion hosts are highly secured servers designed to resist attacks. They are typically used as gateways to more sensitive systems in a network.


Q3. Having detailed logging serves which of the following purposes? Select all that apply.

Answer:

  • Event reconstruction
  • Auditing
  • Vulnerability detection
    Explanation:
    Detailed logs help reconstruct events during incident response, support compliance auditing, and can identify vulnerabilities or unusual activity.

Q4. Which of these plays an important role in keeping attack traffic off your systems and helps to protect users? Select all that apply.

Answer:

  • Antivirus software
  • Antimalware measures
    Explanation:
    Antivirus and antimalware software protect systems by detecting and blocking malicious programs and files, reducing exposure to threats.

Q5. What can provide resilience against data theft, and can prevent an attacker from stealing confidential information from a hard drive that was stolen?

Answer: Full disk encryption (FDE)

Explanation: FDE encrypts the entire hard drive, ensuring that data cannot be accessed without proper authentication, even if the physical drive is stolen.


Q6. What does applying software patches protect against? Select all that apply.

Answer:

  • Data tampering
  • Newly found vulnerabilities
    Explanation:
    Software patches address security vulnerabilities and bugs, preventing tampering and exploiting known flaws. Undiscovered vulnerabilities require proactive threat detection, not patches.

Q7. When installing updates on critical infrastructure, it’s important to be what?

Answer: Careful

Explanation: Critical infrastructure requires careful planning and testing when installing updates to avoid disruptions or introducing new issues.


Q8. What is the best way to avoid personal, one-off software installation requests?

Answer: A clear application whitelist policy

Explanation: An application whitelist policy restricts software installation to pre-approved programs, reducing the risk of unauthorized or harmful software.


Q9. What is a defining characteristic of a defense-in-depth strategy to IT security?

Answer: Multiple overlapping layers of defense

Explanation: Defense-in-depth employs multiple security measures at different levels to provide redundancy and comprehensive protection.


Q10. Which of the following are potential attack vectors? Select all that apply.

Answer:

  • Network protocols
  • Email attachments
  • Network interfaces
  • Passwords
    Explanation:
    These are all common methods that attackers can exploit to gain unauthorized access or compromise systems.

Get IT Security: Defense Against The Digital Dark Arts Practice Quiz Answers >>

Get Module 01 Challenge: Understanding Security Threats Quiz Answers

Module 02 Challenge: Pelcgbybtl (Cryptology) Graded Quiz Answers

Module 03 Challenge Authentication Authorization & Accounting Quiz Answers

Module 04 Challenge: Securing Your Networks Quiz Answers

Module 05 Challenge: Defense in Depth Quiz Answers

Share your love

Newsletter Updates

Enter your email address below and subscribe to our newsletter

Leave a Reply

Your email address will not be published. Required fields are marked *