final quiz.docx - QUESTION 1 1 In order to move data from an unsecure WAN to a secure LAN you typically begin by segmenting a piece of your LAN into a

final quiz.docx - QUESTION 1 1 In order to move data from...

This preview shows page 1 - 3 out of 20 pages.

QUESTION 11.In order to move data from an unsecure WAN to a secure LAN, you typically begin by segmenting a piece of your LAN into a _________________________, which sits on the outside of your private network facing the public Internet. Servers in this area provide public-facing access to the organization, such as public Web sites. demilitarized zone (DMZ)virtual private network (VPN)remote access domainbotnet 2 points QUESTION 2 1. Of the many tools that can be used in training to connect with an audience of employees, _______________ can inspire a sense of fun that leads to community and commitment. 2 points QUESTION 31.In order to be compliant with Payment Card Industry Data Security Standard (PCIDSS), one of the control objectives that should be included in one’s security policies and controls is building and maintaining a secure network. The reason for this is as follows: 2 points QUESTION 41.It is important for an organization to determine how it wants to manage ____________________, which means how to group various tasks, and____________________, which relates to the number of layers and number of direct reports found in an organization.
Image of page 1
span of control, division of labor separation of duties, flat organizational structure division of labor, separation of duties 2 points QUESTION 51.A ________________ is a technological term used in security policy to describe a future state in which specific goals and objectives have been achieved and which processes, resources, and tools are needed to achieve those goals and objectives. threat vectortarget stateagentcommunications plan 2 points QUESTION 6 1. An organization’s _______________________ is a particular group of differently skilled individuals who are responsible for attending to serious security situations. 2 points
Image of page 2
Image of page 3

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture