Selected Answer SystemApplication Domain Correct Answer SystemApplication

Selected answer systemapplication domain correct

This preview shows page 5 - 8 out of 9 pages.

Selected Answer: System/Application Domain
Image of page 5
Correct Answer: System/Application Domain Question 12 3 out of 3 points Your organization subscribes to a wide area network (WAN) service. What is the most reasonable step you can take to ensure uptime? Selected Answer: Ensure the WAN provider's SLA meets or exceeds your required uptime goals. Correct Answer: Ensure the WAN provider's SLA meets or exceeds your required uptime goals. Question 13 0 out of 3 points Which of the following is a primarily a corrective control in the WAN Domain? Selected Answer: Assurance of wide area network (WAN) availability Correct Answer: Business continuity plan (BCP) Question 14 3 out of 3 points What is meant by wide area network (WAN) optimizer? Selected Answer: A network device or software that can analyze current WAN performance and then modify how new traffic is sent across the WAN Correct Answer: A network device or software that can analyze current WAN performance and then modify how new traffic is sent across the WAN Question 15 0 out of 3 points Which of the following best describes authentication in the Remote Access Domain? Selected
Image of page 6
Answer: A protocol that encrypts each message for transport by a nonencrypting protocol Correct Answer: The process of providing additional credentials that match the user ID or user name Question 16 0 out of 3 points What is a best practice for compliance in the Remote Access Domain? Selected Answer: Ensure the virtual private network (VPN) connection bypasses any firewalls between your VPN endpoint and your internal network. Correct Answer: Use global user accounts whenever possible. Question 17 0 out of 3 points Which of the following is primarily a detective control in the Remote Access Domain? Selected Answer: Proxy server Correct Answer: Traffic analysis Question 18 0 out of 3 points Of the following, what is the best method of maximizing integrity in the Workstation Domain?
Image of page 7
Image of page 8

You've reached the end of your free preview.

Want to read all 9 pages?

  • Spring '14
  • Computer network

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture