1/15
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No analytics yet
Send a link to your students to track their progress
Screened subnet
A zone that connects to both trusted and untrusted networks
Network that is isolated from any untrusted network
Air gapped
Multiple environments from single hardware host
Virtualization
A method to isolate and secure data center workloads individually
Micro-segmentation
Made up of the networks most valuable Data, Assets, Applications and Services (DAAS)
Protect Surface
Enclave
Restricted segment within a segment
Security Zone
A segment that is characterized by its level of trust / security controls
The internet is an ____source
Untrusted
The enterprise server is a ___ source
Trusted
Enclave
Trusted network within our trusted network
Which design principle aligns with Zero Trust?
Privileged Access Management
Which design principle aligns with Defense in Depth?
Multiple layered security controls
Which principle aligns with permission based access controls
Default Deny
Default Deny
Denied permissions until you are deemed trustworthy
Least functionality
System / service is configured to do its bare minimum
Standing privilege
You have privileges all the time