Deck 3: Strengthening the Network

ملء الشاشة (f)
exit full mode
سؤال
Which of the following includes implementing access controls, using compensating controls, and blocking unused ports and services?

A) Hardening a network
B) Network deception
C) Segmenting a network
D) Endpoint security
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
What type of access control consists of fencing and hardware door locks to limit contact with computer devices?

A) Technical access control
B) Physical access control
C) Logical access control
D) Countermeasure access control
سؤال
A discretionary access control is considered a more "real-world" control than a role-based access control.
سؤال
Microsoft Windows ______________ is a feature that provides centralized management and configuration of computers and remote users using Microsoft Active Directory (AD) directory services.
سؤال
What is the most restrictive access control model?
سؤال
What are the two goals when using a honeypot?

A) Deflect and recover
B) Infect and remove
C) Inspect and discover
D) Deflect and discover
سؤال
Which of the following is a minimally configured administrator server within a DMZ that connects two dissimilar security zones while providing tightly restricted access between them?

A) VirtualBox
B) Jump box
C) Remote Desktop Services
D) Guest network
سؤال
A(n) ____________ is an organization's private network that can only be accessed by approved internal users.
سؤال
Which of the following is not a type of restriction criteria for network access control?

A) Budget-based
B) Time-based
C) Role-based
D) Location-based
سؤال
What is a publicly released software security update intended to repair a vulnerability?
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/10
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 3: Strengthening the Network
1
Which of the following includes implementing access controls, using compensating controls, and blocking unused ports and services?

A) Hardening a network
B) Network deception
C) Segmenting a network
D) Endpoint security
Hardening a network
2
What type of access control consists of fencing and hardware door locks to limit contact with computer devices?

A) Technical access control
B) Physical access control
C) Logical access control
D) Countermeasure access control
Physical access control
3
A discretionary access control is considered a more "real-world" control than a role-based access control.
False
4
Microsoft Windows ______________ is a feature that provides centralized management and configuration of computers and remote users using Microsoft Active Directory (AD) directory services.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 10 في هذه المجموعة.
فتح الحزمة
k this deck
5
What is the most restrictive access control model?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 10 في هذه المجموعة.
فتح الحزمة
k this deck
6
What are the two goals when using a honeypot?

A) Deflect and recover
B) Infect and remove
C) Inspect and discover
D) Deflect and discover
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 10 في هذه المجموعة.
فتح الحزمة
k this deck
7
Which of the following is a minimally configured administrator server within a DMZ that connects two dissimilar security zones while providing tightly restricted access between them?

A) VirtualBox
B) Jump box
C) Remote Desktop Services
D) Guest network
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 10 في هذه المجموعة.
فتح الحزمة
k this deck
8
A(n) ____________ is an organization's private network that can only be accessed by approved internal users.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 10 في هذه المجموعة.
فتح الحزمة
k this deck
9
Which of the following is not a type of restriction criteria for network access control?

A) Budget-based
B) Time-based
C) Role-based
D) Location-based
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 10 في هذه المجموعة.
فتح الحزمة
k this deck
10
What is a publicly released software security update intended to repair a vulnerability?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 10 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 10 في هذه المجموعة.