Question 14 1.Using switches, routers, internal firewalls, and other devices, you can restrict network traffic with a ____________________, which limits what and how computers are able to talk to each other. A. demilitarized zoneB. flat networkC. snifferD. segmented network 2 points Question 15 1.In workstation domain policies, _________________ provide the specific technology requirements for each device. IT staff uses recorded and published procedures to enact configurations by devices to ensure that secure connectivity for remote devices exists, as well as virus and malware protection and patch management capability, among several other related functions. 2 points Question 16
1._______________refers to an attempt to cause fear or major disruptions in a society through hacking computers. Such attacks target government computers, major companies, or key areas of the economy. 2 points Question 17 1.The window of ________________ is the time between when an opportunity for risk is identified and when the risk is ultimately eliminated by a patch. 2 points Question 18 1.While it would not be possible to classify all data in an organization, there has nonetheless been an increase in the amount of unstructured data retained in recent years, which has included data and logs. There are many different ways to make the time-consuming and expensive process of retaining data less challenging. Which of the following is notone these approaches? A. Classify only the data that is most vital and contains the highest risk to the organization.B. Classify data by point of origin or storage location.
C. Classify data at use or time of inception.D. Classify all forms of data no matter the risk to the organization. 2 points Question 19 1.If human action is required, the control is considered _______________. 2 points Question 20 1.A(n) __________________ is a term used to indicate any unwanted event that takes places outside the normal daily security operations. This type of event relates to a breakdown in controls as identified by the security policies. 2 points Question 21 1.There are a number of classifications that can be applied to security controls. Which of the following is notone the classifications?
You've reached the end of your free preview.
Want to read all 19 pages?