Understanding Defense Flashcards

1
Q

How does BYOD change the way in which businesses implement networks?​

A

BYOD provides flexibility in where and how users can access network resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which device is usually the first line of defense in a layered defense-in-depth approach?

A

Edge router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

With the evolution of borderless networks, which vegetable is now used to describe a defense-in-depth approach?

A

Artichoke

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which type of business policy establishes the rules of conduct and the responsibilities of employees and employers?

A

Company

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

An administrator is concerned with restricting which network applications and uses are acceptable to the organization. What security policy component does the administrator use to address these concerns?

A

Acceptable Use Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What component of a security policy explicitly defines the type of traffic allowed on a network and what users are allowed and not allowed to do?

A

Acceptable Use Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What device would be used as the third line of defense in a defense-in-depth approach?

A

Internal Router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The security policy of an organization allows employees to connect to the office intranet from their homes. Which type of security policy is this?

A

Remote Access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a characteristic of a layered defense-in-depth security approach?

A

The failure of one safeguard does not affect the effectiveness of the other safeguards.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which is a BYOD security best practice?

A

Subscribe to a device locator service with remote wipe feautre.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What do security compliance regulations define?

A

What organizations are responsible for providing and the liability for failure to comply.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What device would be used as a second line of defense in a defense-i-depth approach?

A

Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which two areas must an IT security person understand in order to identify vulnerabilities on a network?

A

Hardware used by applications and important applications used.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly