Live Virtual Machine Lab 9.2: Module 09 Enterprise Network Security Configuration Concepts
When setting up a data center in a particular geography, which of the following points must be considered? [Choose all that apply]
All options
Which of the following relates to the term Data Sovereignty?
Country specific laws and regulations
Which of the following should be mentioned by a network diagram? [Choose all that apply.]
Devices present on the network Connectivity between these devices IP addresses and names of these devices
Which of the following offerings can be provided by a Cloud Access Service Broker (CASB)? [Choose all that apply]
Identity and Access Management (IAM) Data Loss Prevention (DLP) Malware prevention Threat prevention Cloud governance
Which of the following term relates to the accuracy and consistency of data?
Integrity