MotaungS_Module 5 Continuous Assessment 8.pdf

Which of the following is not part of the

  • No School
  • AA 1
  • 11

This preview shows page 5 - 9 out of 11 pages.

15. Which of the following is not part of the authentication methods? SCREENED SUBNETWSUSDNS SERVERSDHCP SERVERNPS IPsecVPNDHCPGPO Computer and userKerberos v5computer certificate
Image of page 5

Subscribe to view the full document.

8/13/2019 CA08 | Continuous Assessment | 48573_Lvl5 Courseware | Gijima School of Digital ; 7/12 16. Security policies are individual policies and guidelines that you create to govern the secure and appropriate use of technology and processes within your organization? 17. Which of the following is not part of designing security? 18. Most successful networks attacks succeed by exploiting common and well-known vulnerabilities or weaknesses. Which of the following is not part of the mitigating common network vulnerability? Request authentication for inbound and outbound connections True False thread modeling perform risk management detect and react DNS forwarder Account password Audit settings Application and services GPO settings
Image of page 6
8/13/2019 CA08 | Continuous Assessment | 48573_Lvl5 Courseware | Gijima School of Digital ; 8/12 19. Risk assessment helps to ensure that your security plan is rational and that you apply your resources to maximize result? 20. To deploy and configure Direct Access, your organization must support the following infrastructure components. Which of the following can be any windows server 2012 or windows server 2012 R2 server that joins to domain? 21. Which of the following GPO settings changes? 22. ISATAP is not a DirectAccess tunneling protocol?
Image of page 7

Subscribe to view the full document.

8/13/2019 CA08 | Continuous Assessment | 48573_Lvl5 Courseware | Gijima School of Digital ; 9/12 22. ISATAP is not a DirectAccess tunneling protocol?
Image of page 8
Image of page 9
  • Fall '19
  • Virtual private network, Tunneling protocol, Gijima School of Digital

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern