94%(280)264 out of 280 people found this document helpful
This preview shows page 1 - 3 out of 14 pages.
Question 12 out of 2 pointsIn order to move data from an unsecure WAN to a secure LAN, you typically begin by segmenting a piece of your LAN into a _________________________, which sits on the outside of your private network facing the public Internet. Servers in this area provide public-facing access to the organization, such as public Web sites.Question 22 out of 2 pointsA(n) ___________________ sets expectations on the use and security of mobiledevices, whereas a(n) _________________ establishes a broad set of rules for approved conduct when a user accesses information on company-owned devices.Question 32 out of 2 pointsUsing switches, routers, internal firewalls, and other devices, you can restrict network traffic with a ____________________, which limits what and how computers are able to talk to each other.Question 42 out of 2 pointsAuthentication of a workstation and encryption of wireless traffic are issues that belong to which of the following two domains?
Question 52 out of 2 pointsRemote authentication has always been a concern because the person is coming from a public network, and many companies require two-factor authentication for remote access. Which of the following is notone of the most commonly accepted types of credentials?Question 62 out of 2 pointsThough there are many ways to group security policies, a common method is to organize common risks and related policy issues into__________________that share similarities but are distinctive enough to allow logical separation into more manageable secure areas.Question 70 out of 2 pointsOne of the key functionalities of a central management system is inventory management, which does which of the following?