Selected Answer Every device configuration requires a specific procedure so

Selected answer every device configuration requires a

This preview shows page 7 - 11 out of 15 pages.

Selected Answer: Every device configuration requires a specific procedure, so there needs to be a related procedure document.
Image of page 7
Correct Answer: Because many configuration processes reuse the same procedure, there does not need to be a new procedure document for every configuration. Question 26 2 out of 2 points An important principle in information security is the concept of layers of security , which is often referred to as layered security , or defense in depth . Which of the following is not an example of a layer of security? Selected Answer: a control standard Correct Answer: a control standard Question 27 2 out of 2 points Baseline LAN standards are concerned with network traffic monitoring because no matter how good firewalls and routers can be, they are still not 100% effective. Thus, _________________ offer a wide range of protection because they seek out patterns of attack. Selected Answer: intrusion systems Correct Answer: intrusion systems Question 28 0 out of 2 points In general, WAN-specific standards identify specific security requirements for WAN devices. For example, the ____________________ explains the family of controls needed to secure the connection from the internal network to the WAN router, whereas the ______________________ identifies which controls are vital for use of Web services provided by suppliers and external partnerships. Selected Answer: WAN router security standard, Domain Name System Correct Answer: WAN router security standard, Web services standard
Image of page 8
Question 29 0 out of 2 points Which of the following control standards in the system/application domain maintains control of both managing errors and ensuring against potentially damaging code? Selected Answer: authentication Correct Answer: developer-related standards Question 30 0 out of 2 points In order to form an IRT, an organization is required to create a charter; this document identifies the authority, mission, and goals of a committee or team, and there are a number of different types of IRT models for doing this. Which of the following models permits an IRT to have the complete authority to ensure a breach is contained? Selected Answer: IRT that acts in a coordination role Correct Answer: IRT that provides on-site response Question 31 0 out of 2 points An organization’s _______________________ is a particular group of differently skilled individuals who are responsible for attending to serious security situations. Selected Answer: disaster recovery plan team (DRPT) Correct Answer: incident response team (IRT) Question 32 2 out of 2 points There are particular tools and techniques that the IRT utilizes to gather forensic evidence, including ____________________, which articulates the manner used to document and protect evidence. Selected Answer: chain of custody
Image of page 9
Correct Answer: chain of custody Question 33 2 out of 2 points While the amount of data known as mission-critical depends on the organization and industry, such data should only represent less than ____________ percent of the data population.
Image of page 10
Image of page 11

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture