Module 18: Understanding Defense Flashcards

1
Q

How does BYOD change the way in which businesses implement networks?​

BYOD devices are more expensive than devices that are purchased by an organization.
BYOD provides flexibility in where and how users can access network resources.
BYOD requires organizations to purchase laptops rather than desktops.
BYOD users are responsible for their own network security, thus reducing the need for organizational security policies.

A

BYOD provides flexibility in where and how users can access network resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which device is usually the first line of defense in a layered defense-in-depth approach?

internal router
firewall
access layer switch
edge router

A

Edge router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

With the evolution of borderless networks, which vegetable is now used to describe a defense-in-depth approach?

cabbage
lettuce
artichoke
onion

A

artichoke

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which type of business policy establishes the rules of conduct and the responsibilities of employees and employers?

data
security
employee
company

A

company

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

An administrator is concerned with restricting which network applications and uses are acceptable to the organization. What security policy component does the administrator use to address these concerns?

network maintenance policy
remote access policy
incident handling procedures policy
acceptable use policy

A

acceptable use policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What component of a security policy explicitly defines the type of traffic allowed on a network and what users are allowed and not allowed to do?

acceptable use policies
remote access policies
password policies
identification and authentication policies

A

acceptable use policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What device would be used as the third line of defense in a defense-in-depth approach?

A

internal router

  1. Edge Router
  2. Firewall
  3. Internal Router
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Refer to the exhibit. The security policy of an organization allows employees to connect to the office intranet from their homes. Which type of security policy is this?

A

Remote access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a characteristic of a layered defense-in-depth security approach?

The layers define a set of security objectives for a company and define the rules of behavior for users and administrators.
The failure of one safeguard does not affect the effectiveness of the other safeguards.
The different layers work in isolation to create a security architecture.
The layers set a baseline of acceptable use of the network.

A

The failure of one safeguard does not affect the effectiveness of the other safeguards.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which is a BYOD security best practice?

have all users install an antivirus program of their choice on the BYOD device
subscribe to a device locator service with remote wipe feature
disable use of MDM software on any of the BYOD devices
use one global complex password for all BYOD devices

A

Subscribe to a device locator service with remote wipe feature

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What do security compliance regulations define?

which websites users cannot access
which defense-in-depth mechanisms to adopt
what organizations are responsible for providing and the liability for failure to comply
which security appliances can be used

A

what organizations are responsible for providing and the liability for failure to comply

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What device would be used as a second line of defense in a defense-in-depth approach?

edge router
internal router
switch
firewall

A

firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly