Live Virtual Machine Lab 6.1: Module 06 Securing an Environment using Mitigating Techniques

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Which of the following statements are true for application whitelisting and blacklisting? [Choose all that apply]

>An administrator can blacklist or whitelist applications that the users can run using Software Restriction Policies >If an application or a specific path that contains the executables is blacklisted, then all executables within the defined path are blacklisted

To prevent the spread of an attack, which of the following methods of isolation can be used? [Choose all that apply]

>Isolate the affected systems >Isolate the attacker

Which mobile device management method allows the employee to purchase a mobile device, but the organization has complete control over the device?

Choose Your Own Device (CYOD)

When implementing segmentation as a proactive measure, which of the following types of segments exist on a network? [Choose all that apply]

Datacenter Guests Users

If two segments need to talk to each other in a segmented network, which of the following is required?

Firewall


Ensembles d'études connexes

AP Gov: The Nine Foundational Documents

View Set

ASU MKT 425 Country Manager Quiz

View Set

330 IT Infrastructure (HW, SW, Cloud)

View Set