IT Security_ Defense against the digital dark arts - Defense in Depth - Week 5 8. How is binary whitelisting a better option than antivirus software?: It can block unknown or emerging threats 9. What does full-disk encryption protect against?: Data theft, Tampering with system files 10. What's the purpose of escrowing a disk encryption key?: Performing data recovery 11. Why is it important to keep software up-to-date?: To address any security vulnerabilities 12. What are some types of software that you'd want to have an explicit application policy for?: Video Games, Filesharing Software 13. How are attack vectors and attack surfaces related?: An attack surface is the sum of all attack vectors 14. Having detailed logging serves which of the following purposes?: Event Reconstruction, Auditing 15. What is a class of vulnerabilities that are unknown before they are ex- ploited?: 0-Days

Contact the Author

Please Sign In to contact this author.