232 Network Cybersecurity Ch 1

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

A security intern is reviewing the corporate network topology diagrams before participating in a security review. Which network topology would commonly have a large number of wired desktop computers?

Campus Area Networks (CANs) commonly have multiple LANs that have host devices attached. A SOHO topology contains wired and wireless hosts on a limited basis. Data centers and cloud topologies typically do not have PCs.

Which type of network commonly makes use of redundant air conditioning and a security trap?

Data centers use a variety of techniques for security including redundant heating, ventilation, and air conditioning (HVAC), UPS systems, fire alarms, sprinklers, video surveillance, electronic motion detectors, security traps, biometric security, security officers, fences, gates, video surveillance, and security breach alarms. Even though cloud-based virtualized servers and network devices may be housed in a data center, protection for cloud computing requires other technologies.

Refer to the exhibit. An IT security manager is planning security updates on this particular network. Which type of network is displayed in the exhibit and is being considered for updates?

A distinguishing factor of CANs are that they have interconnected LANs.

Which technology is used to secure, monitor, and manage mobile devices?

Mobile Device Management (MDM) is used to secure, monitor, and manage both corporate-owned and employee-owned devices such as smartphones, tablets, laptops, and desktops.

Which resource is affected due to weak security settings for a device owned by the company, but housed in another location?

Cloud storage is popular and has many benefits. However data stored there could be compromised due to weak security settings.

Which security measure is typically found both inside and outside a data center facility?

Continuous video surveillance is a security measure found both inside and outside a data center facility. A gate provides outside perimeter security. Security traps, biometrics access, and exit sensors provide inside perimeter security.

When considering network security, what is the most valuable asset of an organization?

Data, such as research and development data, sales data, financial data, human resource and legal data, employee data, contractor data, and customer data, is likely to be the most valuable asset for an organization.

What is hyperjacking?

Hyperjacking occurs when an attacker hijacks a Virtual Machine (VM) hypervisor and then uses that VM to launch an attack on other data center devices.

Which statement accurately characterizes the evolution of threats to network security?

Internal threats can be intentional or accidental and cause greater damage than external threats because the internal user has direct access to the internal corporate network and corporate data.

Which security technology is commonly used by a teleworker when accessing resources on the main corporate office network?

VPNs are commonly used between corporate sites and between mobile or remote workers that connect to and use resources on the corporate network.


संबंधित स्टडी सेट्स

One Step multiplication and Division Equations

View Set

MC Chapter 28 the child with a GI condition & 29 the child with a GU condition

View Set

Chp. 19. Program Design and Technique for Speed and Agility Training

View Set

U-world: Gen-Chem: Thermo chemistry#1

View Set