A _____ is used to access and manage devices that are in another security zone from where a user belongs
jump box
Sending logs to a _____ server or a _____ ensures that copies of the logs exist in a secure location
syslog , bastion host
redirects traffic from its original destination to a destination of a user’s choice
Sinkholing
provides continuous monitoring and response to advanced threats.
Endpoint detection and response (EDR)
This defense splits a network into subnetworks where each subnetwork has different security and performance requirements. It is used to increase the efficiency of a network.
Segmentation