97%(152)148 out of 152 people found this document helpful
This preview shows page 5 - 8 out of 15 pages.
Question 17 2 out of 2 pointsThe act of recording noteworthy security events that transpire on a network or computing device is known as a(n) ______________________. Question 18 2 out of 2 pointsWhich of the following has the responsibility of offering instruction on intrusion detection systems and intrusion prevention system standards as well as their accompanying uses for diminishing false alerts?
Question 19 2 out of 2 pointsIn general, WAN-specific standards identify specific security requirements for WAN devices. For example, the ____________________ explains the family of controls needed to secure the connection from the internal network to the WAN router, whereas the ______________________ identifies which controls are vital for use of Web services provided by suppliers and external partnerships. Question 20 2 out of 2 pointsThe system/application domain covers an expansive range of topics; therefore, the baseline standards in this domain are diverse. For example, the _____________________ explain how to compose and assess the security of applications. Question 21 2 out of 2 pointsWhich of the following statements illustrates the importance of the LAN-to-WAN domain to an organization’s security?
Question 22 2 out of 2 pointsIt is important that LAN guidelines transfer technical knowledge and experience by guiding an individual through core principles and varied ways of considering risks. Which of the following guidelines documents instructions on the intricacies and uses of wireless structures and types? Question 23 2 out of 2 points_____________ risk is the possible outcome that can occur when an organization or business unsuccessfully addresses its fiscal obligations.