Live Virtual Lab 9.2: Module 09 Enterprise Network Security Configuration Concepts
Which of the following should be mentioned by a network diagram? [Choose all that apply.] Connectivity between the devices Devices present on the network Configuration of the devices IP addresses and names of the devices Names of users using the devices
Connectivity between the devices Devices present on the network IP addresses and names of the devices
Which of the following relates to the term Data Sovereignty? A. Country specific laws and regulations B. The usage of the data by the organization's users C. The type of storage used for data D. An organization's internal security policy
Country specific laws and regulations
Which of the following term relates to the accuracy and consistency of data? A. Confidentiality B. Availability C. Discretion D. Integrity
Integrity
When setting up a data center in a particular geography, which of the following points must be considered? [Choose all that apply] Internet service provider's presence Fiber backbone availability Type of connectivity available Locations of the customers Power availability
All of them
Which of the following offerings can be provided by a Cloud Access Service Broker (CASB)? [Choose all that apply] Malware prevention Threat prevention Identity and Access Management (IAM) Data Loss Prevention (DLP) Cloud governance Endpoint protection
Malware prevention Threat prevention Identity and Access Management (IAM) Data Loss Prevention (DLP) Cloud governance