Live Virtual Machine Lab 6.1: Module 06 Securing an Environment using Mitigating Techniques
Which of the following statements are true for application whitelisting and blacklisting? [Choose all that apply]
- An administrator can blacklist or whitelist applications that the users can run using Software Restriction Policies - If an application or a specific path that contains the executables is blacklisted, then all executables within the defined path are blacklisted
When implementing segmentation as a proactive measure, which of the following types of segments exist on a network? [Choose all that apply]
- Datacenter - Users - Guest
To prevent the spread of an attack, which of the following methods of isolation can be used? [Choose all that apply]
- Isolate the affected systems - Isolate the attacker
Which mobile device management method allows the employee to purchase a mobile device, but the organization has complete control over the device?
Choose Your Own Device (CYOD)
If two segments need to talk to each other in a segmented network, which of the following is required?
Firewall