1. An attacker is guessing the password to a certain username to
attempt to gain unauthorized access to a bank account. After several
tries, they are able to gain access. Which defense measure could have
prevented this?
2.There was recently an insider attack at your company. Someone from
the IT department gained access to plans from the management
department and leaked them to a competitor in exchange for money.
Which defense measure could have prevented this?
3. You have created an application with many layers of defense. Since
you know you are not relying on security by obscurity, it is okay to
share the specifics of how you implemented security on your
application.
4. Your company only allows certain people to use the “sudo” command
on their Linux system. The sudo command allows users to run commands
with temporary permissions. Which method of defense does this show?