Get IT Security: Defense Against The Digital Dark Arts Graded Quiz Answers
Table of Contents
Q1. A hacker gained access to a network through malicious email attachments. Which one of these is important when talking about methods that allow a hacker to gain this access?
Answer: An attack vector
Explanation: An attack vector is the pathway or method used by a hacker to access a system, such as malicious email attachments in this case.
Q2. What are Bastion hosts?
Answer: Servers that are specifically hardened and minimized to reduce what's permitted to run on them.
Explanation: Bastion hosts are highly secured servers designed to resist attacks. They are typically used as gateways to more sensitive systems in a network.
Q3. Having detailed logging serves which of the following purposes? Select all that apply.
Answer:
Event reconstruction
Auditing
Vulnerability detection
Explanation:
Detailed logs help reconstruct events during incident response, support compliance auditing, and can identify vulnerabilities or unusual activity.
Q4. Which of these plays an important role in keeping attack traffic off your systems and helps to protect users? Select all that apply.
Answer:
Antivirus software
Antimalware measures
Explanation:
Antivirus and antimalware software protect systems by detecting and blocking malicious programs and files, reducing exposure to threats.
Q5. What can provide resilience against data theft, and can prevent an attacker from stealing confidential information from a hard drive that was stolen?
Answer: Full disk encryption (FDE)
Explanation: FDE encrypts the entire hard drive, ensuring that data cannot be accessed without proper authentication, even if the physical drive is stolen.
Q6. What does applying software patches protect against? Select all that apply.
Answer:
Data tampering
Newly found vulnerabilities
Explanation:
Software patches address security vulnerabilities and bugs, preventing tampering and exploiting known flaws. Undiscovered vulnerabilities require proactive threat detection, not patches.
Q7. When installing updates on critical infrastructure, it’s important to be what?
Answer: Careful
Explanation: Critical infrastructure requires careful planning and testing when installing updates to avoid disruptions or introducing new issues.
Q8. What is the best way to avoid personal, one-off software installation requests?
Answer: A clear application whitelist policy
Explanation: An application whitelist policy restricts software installation to pre-approved programs, reducing the risk of unauthorized or harmful software.
Q9. What is a defining characteristic of a defense-in-depth strategy to IT security?
Answer: Multiple overlapping layers of defense
Explanation: Defense-in-depth employs multiple security measures at different levels to provide redundancy and comprehensive protection.
Q10. Which of the following are potential attack vectors? Select all that apply.
Answer:
Network protocols
Email attachments
Network interfaces
Passwords
Explanation:
These are all common methods that attackers can exploit to gain unauthorized access or compromise systems.
Get IT Security: Defense Against The Digital Dark Arts Practice Quiz Answers >>
Get Module 01 Challenge: Understanding Security Threats Quiz Answers
Module 02 Challenge: Pelcgbybtl (Cryptology) Graded Quiz Answers
Module 03 Challenge Authentication Authorization & Accounting Quiz Answers
Module 04 Challenge: Securing Your Networks Quiz Answers
Module 05 Challenge: Defense in Depth Quiz Answers