100%(1)1 out of 1 people found this document helpful
This preview shows page 1 - 3 out of 20 pages.
QUESTION 11.In order to move data from an unsecure WAN to a secure LAN, you typically begin by segmenting a piece of your LAN into a _________________________, which sits on the outside of your private network facing the public Internet. Servers in this area provide public-facing access to the organization, such as public Web sites.demilitarized zone (DMZ)virtual private network (VPN)remote access domainbotnet2 points QUESTION 21.Of the many tools that can be used in training to connect with an audience of employees, _______________ can inspire a sense of fun that leads to community and commitment.2 points QUESTION 31.In order to be compliant with Payment Card Industry Data Security Standard (PCIDSS), one of the control objectives that should be included in one’s security policies and controls is building and maintaining a secure network. The reason for this is as follows:2 points QUESTION 41.It is important for an organization to determine how it wants to manage ____________________, which means how to group various tasks, and____________________, which relates to the number of layers and number of direct reports found in an organization.
span of control, division of laborseparation of duties, flat organizational structuredivision of labor, separation of duties2 points QUESTION 51.A ________________ is a technological term used in security policy to describe a future state in which specific goals and objectives have been achieved and which processes, resources, and tools are needed to achieve those goals and objectives.threat vectortarget stateagentcommunications plan2 points QUESTION 61.An organization’s _______________________ is a particular group of differently skilled individuals who are responsible for attending to serious security situations.2 points