98%(137)134 out of 137 people found this document helpful
This preview shows page 9 - 13 out of 20 pages.
Question 232 out of 2 pointsWhich of the following statements illustrates the importance of the LAN-to-WAN domain to an organization’s security?
Question 240 out of 2 pointsIt is important that LAN guidelines transfer technical knowledge and experience by guiding an individual through core principles and varied ways of considering risks. Which of the following guidelines documents instructions on the intricacies and uses of wireless structures and types?Question 252 out of 2 pointsIn general, WAN-specific standards identify specific security requirements for WAN devices. For example, the ____________________ explains the familyof controls needed to secure the connection from the internal network to the WAN router, whereas the ______________________ identifies which controls are vital for use of Web services provided by suppliers and external partnerships.
Question 262 out of 2 pointsA procure document should accompany every baseline document. Which of the following is a true statement about the circumstances for when a procedure document needs to be created to support the baseline document?Question 272 out of 2 pointsDomain security control requirements are embodied in several different types of documents. One such document is known as _______________________, which uses a hierarchical organizing structure to identify the key terms and their explanations.
Question 282 out of 2 pointsAn important principle in information security is the concept of layers of security, which is often referred to as layered security, or defense indepth. Which of the following is notan example of a layer of security?