Understanding Defense Flashcards
How does BYOD change the way in which businesses implement networks?
BYOD provides flexibility in where and how users can access network resources.
Which device is usually the first line of defense in a layered defense-in-depth approach?
Edge router
With the evolution of borderless networks, which vegetable is now used to describe a defense-in-depth approach?
Artichoke
Which type of business policy establishes the rules of conduct and the responsibilities of employees and employers?
Company
An administrator is concerned with restricting which network applications and uses are acceptable to the organization. What security policy component does the administrator use to address these concerns?
Acceptable Use Policy
What component of a security policy explicitly defines the type of traffic allowed on a network and what users are allowed and not allowed to do?
Acceptable Use Policy
What device would be used as the third line of defense in a defense-in-depth approach?
Internal Router
The security policy of an organization allows employees to connect to the office intranet from their homes. Which type of security policy is this?
Remote Access
What is a characteristic of a layered defense-in-depth security approach?
The failure of one safeguard does not affect the effectiveness of the other safeguards.
Which is a BYOD security best practice?
Subscribe to a device locator service with remote wipe feautre.
What do security compliance regulations define?
What organizations are responsible for providing and the liability for failure to comply.
What device would be used as a second line of defense in a defense-i-depth approach?
Firewall
Which two areas must an IT security person understand in order to identify vulnerabilities on a network?
Hardware used by applications and important applications used.