Unit 1 Review

¡Supera tus tareas y exámenes ahora con Quizwiz!

True

Networks, routers, and equipment require continuous monitoring and management to keep wide are network (WAN) service available.

True

Encrypting the data within databases and storage devices gives an added layer of security

False

Hypertext Transfer Protocol (HTTP) encrypts data transfers between secure browsers and secure web pages

False

The asset protection policy defines an organization's data classification standard.

False

In the Remote Access Domain, if private data or confidential data is comprised remotely, you should set automatic blocking for attempted logon retries.

True

The director of IT security is generally in charge of ensuring that the Workstation Domain conforms to policy.

False

Service-level agreements (SLAs) are optical backbone trunks for private optical backbone networks.

True

A IT security policy framework is like an oultine that identifies where security controls should be used.

False

A VPN router is a security appliance that is used to filter IP packets.

True

Access control lists (ACLs) are used to permit and deny traffic in an IP router.

True

Authorization is the process of granting rights to use and organization's IT assets, systems, applications, and data to a specific user..

False

Crytography is the process of transforming data from cleartext into ciphertext.

True

For businesses and organizations under recent compliance laws, data classifications standards typically include private, confidential, internal use only, and public domain categories.

True

Hypertext Transfer Protocol (HTTP) is the communications protocol between web browsers and websites with data in cleartext.

True

Organizations should start defining their IT security policy framework by defining an asset classification policy.

True

Simple Network Management Protocol (SNMP) is used for network device monitoring, alarm, and performance.

False

The Sarbanes-Oxley (SOX) Act requires all types of financial institutions to protect customers' private financial information

True

The System/Application Domain holds all the mission-critical systems, applications, and data.

True

The most critical aspect of a WAN services contract is how the service provider supplies troubleshooting, network management, and security management services.

False

The weakest link in the security of an IT infrastructure is the server.


Conjuntos de estudio relacionados

Chapter 11: Drug Therapy for Hematopoietic Disorders

View Set

MFT study ch.1: Research Methods

View Set

Ch 1: Information Systems an overview

View Set

PYS 101 Chap 5 - Sensation & Perception

View Set

NURS 1240 Culture & Diversity EAQ

View Set