IT Audit Final

¡Supera tus tareas y exámenes ahora con Quizwiz!

which of the following is primarily a preventative control for integrity in the WAN domain?

configuration change control

which of the following is NOT a common method of maximizing CIA to the LAN-to-WAN domain?

configure a single ISP connection

which of the following WAN types is the most secure

dedicated leased line

what is the primary type of control used to protect data in the WAN domain?

encryption

you have the least amount of control over who accesses data in the __ domain

WAN

what is meant by distributed application

an environment in which the components that make up an application reside on different servers

a systems administrator sets permissions to prevent unauthorized data access by certain users. Each user can perform his or her job but not access data that their job doesn't require. this is the known principle of

least privileged

which of the following is primarily a preventive control for availability in the WAN domain

multiple redundant connections

use of weak passwords, inappropriate use of internet, inappropriate use of e-mail, and divulging confidential information typically constitutes employee security __ violations.

policy

___ are mechanisms that keep an undesired action from happening such as locked doors or computer access controls

preventive controls

defining access controls where each user has the permission to carry out assigned tasks and nothing else is called the

principle of least privilege

which of the following is a type of firewall that makes requests for remote services on behalf of local clients

proxy server

many organizations use a RACI matrix to document tasks and the personnel responsible for the assignments. RACI stands for __,__, consulted, and informed

responsible, accountable

Within the LAN-to-WAN domain, what connects two or more separate networks

router

what is an intrusion detection system?

a network hardware device or software that detects unusual network activity that might represent an intrusion, sends an alert


Conjuntos de estudio relacionados

Chapter 21: Translating Research into Practice

View Set

ECN Chapter 1 and 2: Homework and Quiz

View Set

Chapter 12: PrepU - Nursing Assessment: Cardiovascular and Circulatory Function

View Set

ITC 660 Quiz 3 - Malicious Attacks, Threats, and Vulnerabilities

View Set

NUR 2890 Chapter Questions Exam 1

View Set

Time (seconds, minutes, hours, days)

View Set

The "Revolution of 1800"-- the Administration of Thomas Jefferson

View Set