Cybersecurity Module 6

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Which of the following statements are true for application whitelisting and blacklisting? Software Restriction Policy for restricting applications applies only to an individual user and not to a group of users An administrator can blacklist or whitelist applications that the users can run using Software Restriction Policies Application blacklisting and whitelisting is always applied at the domain level If an application or a specific path that contains the executables is blacklisted, then all executables within the defined path are blacklisted

An administrator can blacklist or whitelist applications that the users can run using Software Restriction Policies If an application or a specific path that contains the executables is blacklisted, then all executables within the defined path are blacklisted

Which mobile device management method allows the employee to purchase a mobile device, but the organization has complete control over the device?

Choose Your Own Device (CYOD)

If two segments need to talk to each other in a segmented network, which of the following is required?

Firewall

To prevent the spread of an attack, which of the following methods of isolation can be used? Isolate the users Isolate the affected systems Isolate the attacker Isolate the network

Isolate the affected systems Isolate the attacker

When implementing segmentation as a proactive measure, which of the following types of segments exist on a network? Users Datacenter Demilitarized Zone (DMZ) Guests

Users Datacenter Guests


Ensembles d'études connexes

BIO 111 DNA structure and replication

View Set

nervous system practice questions

View Set