Matching
Match each statement with the correct term below.
Premises:
Additional product functionality that wasn’t included in the original release
Connections from the Internet from customers, remote employees, or trusted business partners
A dedicated application that can be installed on a server to perform as a firewall
Collections of updates and fixes that often include additional features
Connections on the internal network from company-owned resources and employees
Identify traffic and protocols that are allowed to and from the perimeter network
Connections from the Internet
The process of making a system more secure from the default configuration
Added as a buffer between an internal protected network and an external unprotected network
Responses:
trusted
feature packs
hardening
system policy rules
untrusted
perimeter network
ISA Server
service packs
semi-trusted
Correct Answer:
Premises:
Responses:
Additional product functionality that wasn’t included in the original release
Connections from the Internet from customers, remote employees, or trusted business partners
A dedicated application that can be installed on a server to perform as a firewall
Collections of updates and fixes that often include additional features
Connections on the internal network from company-owned resources and employees
Identify traffic and protocols that are allowed to and from the perimeter network
Connections from the Internet
The process of making a system more secure from the default configuration
Added as a buffer between an internal protected network and an external unprotected network
Premises:
Additional product functionality that wasn’t included in the original release
Connections from the Internet from customers, remote employees, or trusted business partners
A dedicated application that can be installed on a server to perform as a firewall
Collections of updates and fixes that often include additional features
Connections on the internal network from company-owned resources and employees
Identify traffic and protocols that are allowed to and from the perimeter network
Connections from the Internet
The process of making a system more secure from the default configuration
Added as a buffer between an internal protected network and an external unprotected network
Responses:
Related Questions
Q17: Describe the purpose of the WSUS statistics
Q18: The scwcmd command _ is used to
Q19: You can perform the compliance audit with
Q20: _ rules are commonly used to publish
Q21: _ provides updates for all supported versions
Q23: Discuss options for creating a perimeter network.
Q24: When hardening a system, start by making
Q25: When MBSA is installed, the _ command-line
Q26: Regularly checking systems to ensure that they
Q27: The scwcmd command _ is used to