Exam 3: Strengthening the Network

arrow
  • Select Tags
search iconSearch Question
  • Select Tags

What are the two goals when using a honeypot?

Free
(Multiple Choice)
4.7/5
(30)
Correct Answer:
Verified

D

Which of the following includes implementing access controls, using compensating controls, and blocking unused ports and services?

Free
(Multiple Choice)
4.9/5
(29)
Correct Answer:
Verified

A

Which of the following is not a type of restriction criteria for network access control?

Free
(Multiple Choice)
4.8/5
(40)
Correct Answer:
Verified

A

What type of access control consists of fencing and hardware door locks to limit contact with computer devices?

(Multiple Choice)
4.9/5
(25)

A(n) ____________ is an organization's private network that can only be accessed by approved internal users.

(Short Answer)
4.8/5
(35)

Microsoft Windows ______________ is a feature that provides centralized management and configuration of computers and remote users using Microsoft Active Directory (AD) directory services.

(Short Answer)
4.8/5
(25)

What is a publicly released software security update intended to repair a vulnerability?

(Short Answer)
4.8/5
(37)

A discretionary access control is considered a more "real-world" control than a role-based access control.

(True/False)
4.7/5
(28)

Which of the following is a minimally configured administrator server within a DMZ that connects two dissimilar security zones while providing tightly restricted access between them?

(Multiple Choice)
4.9/5
(38)

What is the most restrictive access control model?

(Short Answer)
4.9/5
(34)
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)