Live Virtual Lab 9.2: Module 09 Enterprise Network Security Configuration Concepts

¡Supera tus tareas y exámenes ahora con Quizwiz!

Which of the following should be mentioned by a network diagram? [Choose all that apply.] Connectivity between the devices Devices present on the network Configuration of the devices IP addresses and names of the devices Names of users using the devices

Connectivity between the devices Devices present on the network IP addresses and names of the devices

Which of the following relates to the term Data Sovereignty? A. Country specific laws and regulations B. The usage of the data by the organization's users C. The type of storage used for data D. An organization's internal security policy

Country specific laws and regulations

Which of the following term relates to the accuracy and consistency of data? A. Confidentiality B. Availability C. Discretion D. Integrity

Integrity

When setting up a data center in a particular geography, which of the following points must be considered? [Choose all that apply] Internet service provider's presence Fiber backbone availability Type of connectivity available Locations of the customers Power availability

All of them

Which of the following offerings can be provided by a Cloud Access Service Broker (CASB)? [Choose all that apply] Malware prevention Threat prevention Identity and Access Management (IAM) Data Loss Prevention (DLP) Cloud governance Endpoint protection

Malware prevention Threat prevention Identity and Access Management (IAM) Data Loss Prevention (DLP) Cloud governance


Conjuntos de estudio relacionados

Ch. 11: Optimal Portfolio Choice and the CAPM

View Set

Exam 3: Chapter 10 Cell Reproduction Study Guide

View Set

Security + Topic 2B: Explain threat intelligence sources; Lesson 2: Explaining threat actors and threat intelligence

View Set

Speed, Agility, and Quickness Training Concepts

View Set

Module Two: Key Actors and Ideas on the World Stage

View Set