Live Virtual Machine Lab 9.2: Module 09 Enterprise Network Security Configuration Concepts
Which of the following relates to the term Data Sovereignty?
Country specific laws and regulations
Which of the following should be mentioned by a network diagram? [Choose all that apply.]
Devices present on the network Connectivity between the devices IP addresses and names of the devices
Which of the following term relates to the accuracy and consistency of data?
Integrity
Which of the following offerings can be provided by a Cloud Access Service Broker (CASB)? [Choose all that apply]
Malware prevention Data Loss Prevention (DLP) Identity and Access Management (IAM) Threat prevention Cloud governance
When setting up a data center in a particular geography, which of the following points must be considered? [Choose all that apply]
Type of connectivity available Power availability Locations of the customers Internet service provider's presence Fiber backbone availability [All]