Ch. 1
Which security measure is typically found both inside and outside a data center facility? - a gate - biometric access - continous video serveilance exit sensors security traps
- continous video serveilance Topic 1.2.0 - Continuous video surveillance is a security measure found both inside and outside a data center facility. A gate provides outside perimeter security. Security traps, biometrics access, and exit sensors provide inside perimeter security.
A distinguishing factor of campus area networks (CANs) are that they......
....have interconnected LANs.
A security intern is reviewing the corporate network topology diagrams before participating in a security review. Which network topology would commonly have a large number of wired desktop computers?
CAN Topic 1.2.0 - Campus area networks (CANs) commonly have multiple LANs that have host devices attached. A SOHO topology contains wired and wireless hosts on a limited basis. Data centers and cloud topologies typically do not have PCs.
Which statement accurately characterizes the evolution of threats to network security?
Internal threats can cause even greater damage than external threats Topic 1.1.0 - Internal threats can be intentional or accidental and cause greater damage than external threats because the internal user has direct access to the internal corporate network and corporate data.
Which technology is used to secure, monitor, and manage mobile devices?
MDM Topic 1.2.0 - Mobile Device Management (MDM) is used to secure, monitor, and manage both corporate-owned and employee-owned devices such as smartphones, tablets, laptops, and desktops.
Which security technology is commonly used by a teleworker when accessing resources on the main corporate office network?
VPN
In the video that describes the anatomy of an attack, a threat actor was able to gain access through a network device, download data, and destroy it. Which flaw allowed the threat actor to do this?
a flat network with no subnets of VLANs; The threat actor was able to access and destroy all kinds of corporate data due to a thermostat that was on the network, but was not scanned as part of the security procedures.
What is hyperjacking?
taking over a virtual machine hypervisor as part of a data center attack Topic 1.2.0 - Hyperjacking occurs when an attacker hijacks a virtual machine (VM) hypervisor and then uses that VM to launch an attack on other data center devices.
Which resource is affected due to weak security settings for a device owned by the company, but housed in another location?
cloud storage device
(CAN) Campus Area Networks
consists of interconnected LANs within a limited geographic area.
When considering network security, what is the most valuable asset of an organization?
data
Which type of network commonly makes use of redundant air conditioning and a security trap?
data center