Chapter 4 - Business Challenges Within the Seven Domains of IT Responsibility
Answers
B
| |
A
| |
C
| |
C
| |
LAN-to-WAN Domain
| |
A
| |
Segmented network
| |
A
| |
B
| |
B
| |
D
| |
B
| |
C
| |
B
| |
C
| |
Concentrators
| |
C
| |
IDs and Passwords
|
Private WANs must be encrypted at all times.
| ||||||||||||||||||||||||||||||||||||||
Which of the following attempts to identify where sensitive data is currently stored?
| ||||||||||||||||||||||||||||||||||||||
Voice over Internet Protocol (VoIP) can be used over which of the following?
| ||||||||||||||||||||||||||||||||||||||
Which of the following is not one of the seven domains of typical IT infrastructure?
| ||||||||||||||||||||||||||||||||||||||
Which of the seven domains refers to the technical infrastructure that connects the organization's LAN to a WAN and allows end users to surf the Internet?
| ||||||||||||||||||||||||||||||||||||||
One key difference between RBAC and ABAC is which of the following?
| ||||||||||||||||||||||||||||||||||||||
A ________ is a term that refers to a network that limits what and how computers are able to talk to each other.
| ||||||||||||||||||||||||||||||||||||||
A LAN is efficient for connecting computers within an office or groups of buildings.
| ||||||||||||||||||||||||||||||||||||||
What policy generally requires that employees lock up all documents and digital media at the end of a workday and when not in use?
| ||||||||||||||||||||||||||||||||||||||
What employees learn in awareness training influences them more than what they see within their department.
| ||||||||||||||||||||||||||||||||||||||
What kind of workstation management refers to knowing what software is installed?
| ||||||||||||||||||||||||||||||||||||||
Always applying the most strict authentication method is the best way to protect the business and ensure achievement of goals.
| ||||||||||||||||||||||||||||||||||||||
Generally, remote authentication provides which of the following?
| ||||||||||||||||||||||||||||||||||||||
Remote access does not have to be encrypted if strong authentication is used.
| ||||||||||||||||||||||||||||||||||||||
Where is a DMZ usually located?
| ||||||||||||||||||||||||||||||||||||||
Dedicated network devices whose only function is to create and manage VPN traffic are called VPN ________.
| ||||||||||||||||||||||||||||||||||||||
What is a botnet?
| ||||||||||||||||||||||||||||||||||||||
The minimum standard in authentication for businesses is the use of ________.
Answers
|
Comments
Post a Comment