Chapter 2.5 - Mitigation Techniques

0.0(0)
studied byStudied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/8

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 8:32 PM on 1/29/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

9 Terms

1
New cards

What is the purpose of segmentation?

  • to increase platform security

  • physically, logically, virtually

  • acls to control user access

2
New cards

What is an ACL?

  • access control list

  • controls user access

3
New cards

What is patching?

  • updating

  • third-party updates

  • auto-updates

4
New cards

What is encryption?

  • prevents access to application data files

  • full disk encryption (FDE)

  • application data encryption

5
New cards

What is monitoring?

  • gathering data from devices

    • built-in sensors

    • separate devices

  • sensors

    • IPS

    • logs

  • collectors

    • SIEM, syslog

6
New cards

What is least privilege?

  • rights and permissions should be set to the bare minimum

7
New cards

What is configuration enforcement?

  • perform a posture assessment

  • extensive check

    • patch version

    • certificate status

  • systems out of compliance are quarantined

8
New cards

What is decommissioning?

  • should be a formal policy

  • storage devices need to prioritized

9
New cards

What are some different types of hardening techniques?

  • updates/patches

  • protecting user accounts

  • anti-virus/malware

  • encryption

  • securing network endpoints

  • host-based firewall