Chapter 4 - Business Challenges Within the Seven Domains of IT Responsibility


Answers
1. 
B
2. 
A
3. 
C
4. 
C
5. 
LAN-to-WAN Domain
6. 
A
7. 
Segmented network
8. 
A
9. 
B
10. 
B
11. 
D
12. 
B
13. 
C
14. 
B
15. 
C
16. 
Concentrators
17. 
C
18. 
IDs and Passwords


Private WANs must be encrypted at all times.
  1. True
  2. False

Which of the following attempts to identify where sensitive data is currently stored?
  1. Data Leakage Protection Inventory
  2. DLP Encryption Key
  3. Data Loss Protection Perimeter
  4. DLP Trojans

Voice over Internet Protocol (VoIP) can be used over which of the following?
  1. LAN
  2. WAN
  3. Both
  4. Neither

Which of the following is not one of the seven domains of typical IT infrastructure?
  1. Remote Access Domain
  2. LAN Domain
  3. World Area Network Domain
  4. System/Application Domain

Which of the seven domains refers to the technical infrastructure that connects the organization's LAN to a WAN and allows end users to surf the Internet?

One key difference between RBAC and ABAC is which of the following?
  1. ABAC is dynamic and RBAC is static.
  2. ABAC is static and RBAC is dynamic.
  3. No difference; these are just different terms to mean the same thing.

A ________ is a term that refers to a network that limits what and how computers are able to talk to each other.

A LAN is efficient for connecting computers within an office or groups of buildings.
  1. True
  2. False

What policy generally requires that employees lock up all documents and digital media at the end of a workday and when not in use?
  1. Acceptable use policy
  2. Clean desk policy
  3. Privacy policy
  4. Walk out policy

What employees learn in awareness training influences them more than what they see within their department.
  1. True
  2. False

What kind of workstation management refers to knowing what software is installed?
  1. Inventory management
  2. Patch management
  3. Security management
  4. Discovery management

Always applying the most strict authentication method is the best way to protect the business and ensure achievement of goals.
  1. True
  2. False

Generally, remote authentication provides which of the following?
  1. Fewer controls than if you were in the office
  2. The same controls than if you were in the office
  3. More controls than if you were in the office
  4. Less need for controls than in the office

Remote access does not have to be encrypted if strong authentication is used.
  1. True
  2. False

Where is a DMZ usually located?
  1. Inside the private LAN
  2. Within the WAN
  3. Between the private LAN and public WAN
  4. Within the mail server

Dedicated network devices whose only function is to create and manage VPN traffic are called VPN ________.

What is a botnet?
  1. A piece of software the end user loads onto a device to prevent intrusion
  2. A piece of software a company loads onto a device to monitor its employees
  3. A piece of software a hacker loads onto a device without user knowledge
  4. A piece of software used to communicate between peers

The minimum standard in authentication for businesses is the use of ________.



Answers
1. 
B
2. 
A
3. 
C
4. 
C
5. 
LAN-to-WAN Domain
6. 
A
7. 
Segmented network
8. 
A
9. 
B
10. 
B
11. 
D
12. 
B
13. 
C
14. 
B
15. 
C
16. 
Concentrators
17. 
C
18. 
IDs and Passwords


Comments

Popular posts from this blog

Solar System Overview Questions and Answers

Extra Solar Planets Question and Answer

Chapter 3 - U.S. Compliance Laws and Information Security Policy Requirements