Module 00 Flashcards

1
Q

Security Approach

A

Preventive, Reactive, Retrospective, Proactive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does it prepare network defenders on ?

A

Strategical, technological and operational network security capabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Expectations 01

A

-Plan, implement, and administer network security management for an organization.
-Knowledge of various security risks,threats,vulnerabilities
-Assist in obtaining and maintaining an organization’s compliance with required regulatory standards and frameworks
-Design and implement the network security policies and procedures
-Apply security principles, protocols, and controls that suite todays distributed and mobile computing world.
-Apply strong identity and Access management (IAM) ,Network segmentation, Encryption techniques to strengthen organization network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Instructor

A

Kevin King

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Expectations 02

A

-Manage and maintain windows security administration
-manage and maintain Linux security administration
-Manage and mitigate the security risk and challenges associated with Enterprises mobile device usage policies.
-Manage and mitigate the security risk and challenges associated with IoT devices used in Enterprises
-Implement strong data security techniques that secure an organizations data
-

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Expectations 03

A

-Implement strong data security techniques to secure an organization’s data
-Implement and manage the security of virtualization technologies Network Virtualization(NV), Software-Defined Network(SDN),Network Function Virtualization (NFV), OS Virtualization, Containers, Dockers, Kubernetes used in modern-day networks.
-Implement and manage cloud security on a variety of cloud platforms such as on AWS, Azure, Google Cloud Platform, etc.
-Implement and manage wireless network security
-Perform risk assessments, vulnerability assessment/scanning through various scanning tools and generate detailed reports on it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

IOE

A

Indicators of Exposure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

IOC

A

Indicators of compromise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Exam Code

A

312-38

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly