Live Virtual Machine Lab 6.1: Module 06 Securing an Environment using Mitigating Techniques

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Which mobile device management method allows the employee to purchase a mobile device, but the organization has complete control over the device?

Choose Your Own Device (CYOD)

If two segments need to talk to each other in a segmented network, which of the following is required?

Firewall

Which of the following statements are true for application whitelisting and blacklisting? [Choose all that apply]

If an application or a specific path that contains the executables is blacklisted, then all executables within the defined path are blacklisted An administrator can blacklist or whitelist applications that the users can run using Software Restriction Policies

To prevent the spread of an attack, which of the following methods of isolation can be used? [Choose all that apply]

Isolate the affected systems Isolate the attacker

When implementing segmentation as a proactive measure, which of the following types of segments exist on a network? [Choose all that apply]

Users Guests Datacenter


Set pelajaran terkait

Chapter 48: Caring for Clients with Ostomies

View Set

HESI Remediation Study Questions "Nursing Interventions"

View Set

My AP Questions and Answers Unit 4

View Set

Ch 3: The Accounting Cycle: End of the Period

View Set

10-3 Where Is Agriculture Distributed?

View Set

Skills Lesson: Types of Evidence and Logical Fallacies, Skills Lesson: Types of Evidence and Logical Fallacies Practice

View Set

Health-related Fitness Unit Test

View Set

Life insurance: Completing the application, underwriting, and delivering the policy

View Set