Module 2 Quiz

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or

Already have an account? Sign In »

Time
4 hours 25 minutes
Difficulty
Intermediate
CEU/CPE
4
Video Transcription
00:00
>> Hi. Welcome to the Module 2 quiz.
00:00
We're going to take a quiz on
00:00
everything we learned in Module 2,
00:00
which is our defense in depth module,
00:00
covering all of the different layers that we've gone over
00:00
for the past nine lessons, I think, now.
00:00
Let's jump right into it and see what you learned.
00:00
First question. Which infrastructure security layer
00:00
includes DAR encryption and DLP?
00:00
Is it the network layer,
00:00
the perimeter, data or the application layers?
00:00
Answer is C, it's the data layer.
00:00
The D should give it away.
00:00
DAR stands for Data At Rest encryption,
00:00
and DLP stands for Data Loss Prevention.
00:00
Both of them have the D in it.
00:00
They both work at the data layer.
00:00
Next question. An IPS device
00:00
needs to be blank in order to function.
00:00
Does it need to be out of band,
00:00
inline, Ethernet powered or 802.1x?
00:00
Answer is B, inline.
00:00
Remember we said IPS devices.
00:00
IPS stands for Intrusion Prevention System.
00:00
The P for prevention means it has to
00:00
be inline in order to block,
00:00
IDS is the one that can be out of band,
00:00
802.1x is a NAC protocol and
00:00
Ethernet power to something I just threw in
00:00
there just for an extra answer.
00:00
Next question, which is
00:00
the best encryption choice for wireless networks.
00:00
Is it WPA2,
00:00
WEP, MITRE, or PPTP?
00:00
Answer is WPA2.
00:00
As of today's standards, it's WPA2.
00:00
WEP was the original wireless encryption type,
00:00
it's no longer secure.
00:00
MITRE isn't attack framework,
00:00
and PPTP is a tunneling protocol used in VPN devices.
00:00
802.1x or NAC authenticates using which layer 2 protocol?
00:00
Is it PAC, SQL, IDS or EAP?
00:00
Answer is D, EAP, Extensible Authentication Protocol.
00:00
A PAC is a PAC file.
00:00
We talked about PAC files,
00:00
those are involved with proxies.
00:00
Proxies use, remember, autoconfiguration.
00:00
We can set our devices to be
00:00
autoconfigured for a certain proxy
00:00
by pointing them to a PAC file.
00:00
SQL is a database language and
00:00
IDS is Intrusion Detection System.
00:00
Which DAR method allows for granular encryption control?
00:00
Is it Full Disk,
00:00
Double Key, RSA or File Level Encryption?
00:00
Answer is D, File Level Encryption.
00:00
DAR is Data At Rest encryption,
00:00
so when we talked about the DAR encryption section,
00:00
we said that Full Disk encrypts
00:00
the whole disk like for a laptop,
00:00
that was to prevent people from stealing the device.
00:00
Whereas File Level Encryption lets you get into
00:00
each individual filing and encrypt
00:00
each one with different settings for each one.
00:00
Finally, which of the following tools uses
00:00
data classifications to make blocking decisions?
00:00
Is it IPS,
00:00
DLP, Firewall or EDR?
00:00
Answer is B, DLP, Data Loss Prevention.
00:00
Remember data loss prevention can use those markings and
00:00
data to determine where that restricted data is,
00:00
and then it can take blocking actions in
00:00
your email or on that agent on
00:00
the endpoint or inline through the proxy.
00:00
IPS is Intrusion Prevention System.
00:00
Firewall is a layer 3 blocking device or network device,
00:00
operates at layer 3 and 4,
00:00
and EDR is an Endpoint Detection and Response tool
00:00
that lies on the endpoint and
00:00
helps fight against anomaly-based malware.
00:00
That wraps up our quiz for Module 2.
00:00
I hope you learned something,
00:00
that was the bulk of the course.
00:00
Next up we get a quick module, Module 3,
00:00
we're going to talk about the different security models,
00:00
and how what we've talked about so
00:00
far apply to those models.
Up Next