Save Answer Save Save Click Save and Submit to save and submit Click Save All

Save answer save save click save and submit to save

This preview shows page 7 - 9 out of 16 pages.

2.00000 points Save Answer Save Save Click Save and Submit to save and submit. Click Save All Answers to save all answers.
Image of page 7
3/9/2018 Take Test: Mid-Term Exam – 2018_SPR_MAIN_Operations ... ; 8/16 QUESTION 53 There are several types of domains in the IT infrastructure. Which of the following is not one of thesedomains? userworkstationremote accessVPN 2.00000 points Save Answer Save Answer QUESTION 54 Many organizations have a(n) _____________ policy in place to manage the business concern of howto handle sensitive information in physical form, such as reports. This policy generally requires 2.00000 points Save Answer QUESTION 55 A flat network limits what and how computers are able to talk to each other. Many standards require flatnetworks such as the Payment Card Industry Data Security Standard (PCI DSS). This standardrequires a flat network to further protect credit cardholder information. 2.00000 points Save Answer QUESTION 56 In a central management system that typically manages workstations, one of the key functions isdiscovery management; discovery management systems extract logs from a device and typically movelogs to a central repository 2.00000 points Save Answer Save Answer QUESTION 57 Which of the following is not one of the common network devices found on the LAN domain? flat networkswitchrouterfirewall 2.00000 points Save Answer QUESTION 58 In a flat network, a workstation can communicate with any other computer on the network because ithas few controls, or none, to limit network traffic. 2.00000 points Save Answer Save Answer QUESTION 59 The privacy policy emerged as a type of code of conduct. With the rise of social media, manybusinesses are concerned about employees posting information about the company on social mediasites. For many organizations, posting any information about the business beyond the employee’sname and title is strictly forbidden. 2.00000 points Save Answer QUESTION 60 In order to move data from an unsecure WAN to a secure LAN, you typically begin by segmenting apiece of your LAN into a _________________________, which sits on the outside of your privatenetwork facing the public Internet. Servers in this area provide public-facing access to the organization,such as public Web sites.
Image of page 8
Image of page 9

You've reached the end of your free preview.

Want to read all 16 pages?

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture