Live Virtual machine Lab 6.1 Module 06 securing an environment using mitigating techniques

DevelopmentIn the development environment, the developers code the application. In thisenvironment, for coding, you will find tools, such as Microsoft Visual Studio,Eclipse, Apache NetBeans, and Microsoft Code. The choice of codingapplication depends on the developer’s preference and organization’srequirements. Other than the coding application, you will also find versioncontrol applications, such as SVN.TestDepending on the type of method, such as Waterfall or Agile, being used fordeveloping the application, the testers will either test the full or partialapplication. The testing environment is not a full replica of the developmentenvironment, but it contains only the necessary hardware and software torun the application for testing purposes.StagingUnlike testing, the staging environment replicates the productionenvironment. The idea is to simulate the production environment and thentest the application before it goes out to the production environment. Thestaging tests are always performed before the application is moved to theproduction stage.ProductionAfter the application has been through various stages, and if it is foundworking, it is then moved to the production environment, which is the liveenvironment. The application is made available to the users, who can eitherbe internal or external to the organization. Depending on the applicationarchitecture, the production environment is likely to contain a Web serverand database server. Several organizations protect Web applications with aWeb Application Firewall (WAF).

Live Virtual Machine Labs is an interactive learning environment in MindTap course activities where you can practice problem-solving skills, in real time, on live IT systems.

The IT systems in Live Virtual Machine Labs use Cisco hardware and virtualized Windows, Linux, and UNIX operating systems hosted on VMware and Hyper-V, all accessible via a web browser.

For an introduction to Live Virtual Machine Labs, you can watch this video:

What types of software are typically blacklisted select all that apply?

In the world of network security, a blacklist often consists of malicious software such as viruses, spyware, Trojans, worms and other kinds of malware. You could also have a blacklist of users, IP addresses, applications, email addresses, domains, processes or organizations.

Which type of phishing is conducted over the Voice over IP lines where the attacker pretends to be a legitimate caller from a bank or a financial institution?

Vishing, sometimes called cyber vishing, is a form of phishing that uses a traditional telephone or voice over internet protocol (VoIP) call with either an actual person talking, a text or other vishing tools.

Which method of threat hunting includes disrupt deny destroy and degrade actions?

Kill Chains are a military concept; in the original paper, the authors create a very clever matrix relating courses of actions to the DoD's IO actions: Detect, Deny, Disrupt, Degrade, Deceive, and Destroy.

Which of the following is considered as the root of the Active Directory hierarchy?

An Active Directory always begins with a forest root domain, which is automatically the first domain you install. This root domain becomes the foundation for additional directory components.