Live Virtual Machine Lab 6.1

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

When implementing segmentation as a proactive measure, which of the following types of segments exist on a network? [Choose all that apply]

All

Which mobile device management method allows the employee to purchase a mobile device, but the organization has complete control over the device?

Choose Your Own Device (CYOD)

To prevent the spread of an attack, which of the following methods of isolation can be used? [Choose all that apply]

Isolate the attacker Isolate the affected systems

If two segments need to talk to each other in a segmented network, which of the following is required?

Firewall

Which of the following statements are true for application whitelisting and blacklisting? [Choose all that apply]

*If an application or a specific path that contains the executables is blacklisted, then all executables within the defined path are blacklisted* (NOT)Application blacklisting and whitelisting is always applied at the domain level *An administrator can blacklist or whitelist applications that the users can run using Software Restriction Policies* (NOT)Software Restriction Policy for restricting applications applies only to an individual user and not to a group of users


संबंधित स्टडी सेट्स

UNIT 13 "NATURE" PAGES 116 - 117

View Set

Project Management Professional (PMP)

View Set

Anatomy Test 2 Visible Body Quiz

View Set

Intel and Policy Mid-Term Study Guide

View Set

History before the 1500s What, When, Why?

View Set

North Carolina Veterinary Board Test

View Set

Chapter 9: Early Childhood: Cognitive Development

View Set