Lesson 9.2 - Segmentation

0.0(0)
studied byStudied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/15

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 7:47 PM on 1/25/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

16 Terms

1
New cards

Screened subnet

A zone that connects to both trusted and untrusted networks

2
New cards

Network that is isolated from any untrusted network

Air gapped

3
New cards

Multiple environments from single hardware host

Virtualization

4
New cards

A method to isolate and secure data center workloads individually

Micro-segmentation

5
New cards

Made up of the networks most valuable Data, Assets, Applications and Services (DAAS)

Protect Surface

6
New cards

Enclave

Restricted segment within a segment

7
New cards

Security Zone

A segment that is characterized by its level of trust / security controls

8
New cards

The internet is an ____source

Untrusted

9
New cards

The enterprise server is a ___ source

Trusted

10
New cards

Enclave

Trusted network within our trusted network

11
New cards

Which design principle aligns with Zero Trust?

Privileged Access Management

12
New cards

Which design principle aligns with Defense in Depth?

Multiple layered security controls

13
New cards

Which principle aligns with permission based access controls

Default Deny

14
New cards

Default Deny

Denied permissions until you are deemed trustworthy

15
New cards

Least functionality

System / service is configured to do its bare minimum

16
New cards

Standing privilege

You have privileges all the time

Explore top flashcards