Deck 3: Strengthening the Network
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/10
Play
Full screen (f)
Deck 3: Strengthening the Network
1
Which of the following includes implementing access controls, using compensating controls, and blocking unused ports and services?
A) Hardening a network
B) Network deception
C) Segmenting a network
D) Endpoint security
A) Hardening a network
B) Network deception
C) Segmenting a network
D) Endpoint security
A
2
What type of access control consists of fencing and hardware door locks to limit contact with computer devices?
A) Technical access control
B) Physical access control
C) Logical access control
D) Countermeasure access control
A) Technical access control
B) Physical access control
C) Logical access control
D) Countermeasure access control
B
3
A discretionary access control is considered a more "real-world" control than a role-based access control.
False
4
Microsoft Windows ______________ is a feature that provides centralized management and configuration of computers and remote users using Microsoft Active Directory (AD) directory services.
Unlock Deck
Unlock for access to all 10 flashcards in this deck.
Unlock Deck
k this deck
5
What is the most restrictive access control model?
Unlock Deck
Unlock for access to all 10 flashcards in this deck.
Unlock Deck
k this deck
6
What are the two goals when using a honeypot?
A) Deflect and recover
B) Infect and remove
C) Inspect and discover
D) Deflect and discover
A) Deflect and recover
B) Infect and remove
C) Inspect and discover
D) Deflect and discover
Unlock Deck
Unlock for access to all 10 flashcards in this deck.
Unlock Deck
k this deck
7
Which of the following is a minimally configured administrator server within a DMZ that connects two dissimilar security zones while providing tightly restricted access between them?
A) VirtualBox
B) Jump box
C) Remote Desktop Services
D) Guest network
A) VirtualBox
B) Jump box
C) Remote Desktop Services
D) Guest network
Unlock Deck
Unlock for access to all 10 flashcards in this deck.
Unlock Deck
k this deck
8
A(n) ____________ is an organization's private network that can only be accessed by approved internal users.
Unlock Deck
Unlock for access to all 10 flashcards in this deck.
Unlock Deck
k this deck
9
Which of the following is not a type of restriction criteria for network access control?
A) Budget-based
B) Time-based
C) Role-based
D) Location-based
A) Budget-based
B) Time-based
C) Role-based
D) Location-based
Unlock Deck
Unlock for access to all 10 flashcards in this deck.
Unlock Deck
k this deck
10
What is a publicly released software security update intended to repair a vulnerability?
Unlock Deck
Unlock for access to all 10 flashcards in this deck.
Unlock Deck
k this deck