Filters
Question type

Which of the following includes implementing access controls, using compensating controls, and blocking unused ports and services?


A) Hardening a network
B) Network deception
C) Segmenting a network
D) Endpoint security

E) A) and B)
F) None of the above

Correct Answer

verifed

verified

A

What are the two goals when using a honeypot?


A) Deflect and recover
B) Infect and remove
C) Inspect and discover
D) Deflect and discover

E) None of the above
F) B) and D)

Correct Answer

verifed

verified

D

Microsoft Windows ______________ is a feature that provides centralized management and configuration of computers and remote users using Microsoft Active Directory (AD) directory services.

Correct Answer

verifed

verified

What type of access control consists of fencing and hardware door locks to limit contact with computer devices?


A) Technical access control
B) Physical access control
C) Logical access control
D) Countermeasure access control

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

What is a publicly released software security update intended to repair a vulnerability?

Correct Answer

verifed

verified

A discretionary access control is considered a more "real-world" control than a role-based access control.

A) True
B) False

Correct Answer

verifed

verified

Which of the following is not a type of restriction criteria for network access control?


A) Budget-based
B) Time-based
C) Role-based
D) Location-based

E) A) and D)
F) A) and C)

Correct Answer

verifed

verified

A

A(n) ____________ is an organization's private network that can only be accessed by approved internal users.

Correct Answer

verifed

verified

What is the most restrictive access control model?

Correct Answer

verifed

verified

Mandatory ...

View Answer

Which of the following is a minimally configured administrator server within a DMZ that connects two dissimilar security zones while providing tightly restricted access between them?


A) VirtualBox
B) Jump box
C) Remote Desktop Services
D) Guest network

E) C) and D)
F) A) and B)

Correct Answer

verifed

verified

Showing 1 - 10 of 10

Related Exams

Show Answer