Question 232 out of 2 pointsIn general, WAN-specific standards identify specific security requirements for WAN devices. For example, the ____________________ explains the family of controls needed to secure the connection from the internal network to the WAN router, whereas the ______________________ identifies which controls are vital for use of Web services provided by suppliers and external
partnerships. Question 242 out of 2 points___________________ is a term that denotes a user’s capability to authenticate once to access the network and then have automatic authentication on different applications and devices afterward. Question 250 out of 2 pointsA procure document should accompany every baseline document. Which of the following is a true statement about the circumstances for when a procedure document needs to be created to support the baseline document? Question 26
2 out of 2 points Which of the following statements is most accurate with respect to infrastructure security, as demonstrated by the private sector? Question 270 out of 2 pointsBaseline LAN standards are concerned with network traffic monitoring because no matter how good firewalls and routers can be, they are still not 100% effective. Thus, _________________ offer a wide range of protection because they seek out patterns of attack. Question 282 out of 2 pointsAn important principle in information security is the concept of layers of security, which is often referred to as layered security, or defense indepth. Which of the following is notan example of a layer of security?
You've reached the end of your free preview.
Want to read all 19 pages?
- Spring '14
- Correct Answer, Chief Information Security Officer