Live Virtual Machine Lab 6.1: Module 06 Securing an Environment using Mitigating Techniques

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Which of the following statements are true for application whitelisting and blacklisting? [Choose all that apply]

- An administrator can blacklist or whitelist applications that the users can run using Software Restriction Policies - If an application or a specific path that contains the executables is blacklisted, then all executables within the defined path are blacklisted

When implementing segmentation as a proactive measure, which of the following types of segments exist on a network? [Choose all that apply]

- Datacenter - Users - Guest

To prevent the spread of an attack, which of the following methods of isolation can be used? [Choose all that apply]

- Isolate the affected systems - Isolate the attacker

Which mobile device management method allows the employee to purchase a mobile device, but the organization has complete control over the device?

Choose Your Own Device (CYOD)

If two segments need to talk to each other in a segmented network, which of the following is required?

Firewall


Set pelajaran terkait

ABSOLUTISM IN ENGLAND: 16-17TH CENTURIES

View Set

Object-Oriented Programming Part 2

View Set

Excel Chapter 2, Excel Chapter 1, Microsoft Word Review

View Set

Life Insurance - Review Overall Test Prep Questions Missed

View Set

SCM 421 Topic 5: Sourcing Risk Management and Mitigation

View Set

CH. 14 Understanding individual behavior

View Set