Live Virtual Machine Lab 6.1
Which of the following statements are true for application whitelisting and blacklisting? [Choose all that apply]
*If an application or a specific path that contains the executables is blacklisted, then all executables within the defined path are blacklisted* *An administrator can blacklist or whitelist applications that the users can run using Software Restriction Policies*
Which mobile device management method allows the employee to purchase a mobile device, but the organization has complete control over the device?
Choose Your Own Device (CYOD)
If two segments need to talk to each other in a segmented network, which of the following is required?
Firewall
To prevent the spread of an attack, which of the following methods of isolation can be used? [Choose all that apply]
Isolate the attacker Isolate the affected systems
When implementing segmentation as a proactive measure, which of the following types of segments exist on a network? [Choose all that apply]
Users Guests Datacenter