Unit 1 Review
True
Networks, routers, and equipment require continuous monitoring and management to keep wide are network (WAN) service available.
True
Encrypting the data within databases and storage devices gives an added layer of security
False
Hypertext Transfer Protocol (HTTP) encrypts data transfers between secure browsers and secure web pages
False
The asset protection policy defines an organization's data classification standard.
False
In the Remote Access Domain, if private data or confidential data is comprised remotely, you should set automatic blocking for attempted logon retries.
True
The director of IT security is generally in charge of ensuring that the Workstation Domain conforms to policy.
False
Service-level agreements (SLAs) are optical backbone trunks for private optical backbone networks.
True
A IT security policy framework is like an oultine that identifies where security controls should be used.
False
A VPN router is a security appliance that is used to filter IP packets.
True
Access control lists (ACLs) are used to permit and deny traffic in an IP router.
True
Authorization is the process of granting rights to use and organization's IT assets, systems, applications, and data to a specific user..
False
Crytography is the process of transforming data from cleartext into ciphertext.
True
For businesses and organizations under recent compliance laws, data classifications standards typically include private, confidential, internal use only, and public domain categories.
True
Hypertext Transfer Protocol (HTTP) is the communications protocol between web browsers and websites with data in cleartext.
True
Organizations should start defining their IT security policy framework by defining an asset classification policy.
True
Simple Network Management Protocol (SNMP) is used for network device monitoring, alarm, and performance.
False
The Sarbanes-Oxley (SOX) Act requires all types of financial institutions to protect customers' private financial information
True
The System/Application Domain holds all the mission-critical systems, applications, and data.
True
The most critical aspect of a WAN services contract is how the service provider supplies troubleshooting, network management, and security management services.
False
The weakest link in the security of an IT infrastructure is the server.