Live Virtual Machine Lab 6.1: Module 06 Securing an Environment using Mitigating Techniques

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

Which of the following statements are true for application whitelisting and blacklisting? [Choose all that apply]

- An administrator can blacklist or whitelist applications that the users can run using Software Restriction Policies - If an application or a specific path that contains the executables is blacklisted, then all executables within the defined path are blacklisted

When implementing segmentation as a proactive measure, which of the following types of segments exist on a network? [Choose all that apply]

- Datacenter - Users - Guest

To prevent the spread of an attack, which of the following methods of isolation can be used? [Choose all that apply]

- Isolate the affected systems - Isolate the attacker

Which mobile device management method allows the employee to purchase a mobile device, but the organization has complete control over the device?

Choose Your Own Device (CYOD)

If two segments need to talk to each other in a segmented network, which of the following is required?

Firewall


Kaugnay na mga set ng pag-aaral

ABSOLUTISM IN ENGLAND: 16-17TH CENTURIES

View Set

Object-Oriented Programming Part 2

View Set

Excel Chapter 2, Excel Chapter 1, Microsoft Word Review

View Set

Life Insurance - Review Overall Test Prep Questions Missed

View Set

SCM 421 Topic 5: Sourcing Risk Management and Mitigation

View Set

CH. 14 Understanding individual behavior

View Set