Information Technology Reference
In-Depth Information
4. Users are reporting a DoS attack in the DMZ. All the servers have been patched, and
all unnecessary services have been turned off. What else can you do to alleviate some
of the attack's effects? (Select all that apply.)
a.
Rate limit traffic on the firewall's ingress.
b.
Use ACLs to let only allowed traffic into the network.
c.
Block all TCP traffic from unknown sources.
d.
DHCP snooping for the DMZ segment.
5. Yo u are a network engineer for ABC Corp. Yo u need to bring your coworkers up-to-
date on network security threats. What would you discuss with them? (Select all
that apply.)
a.
Reconnaissance and gaining unauthorized access
b.
DHCP snooping
c.
DMZ security
d.
DoS
6. Tr ue or fals e: IPs ec c an en s ure data inte g r it y and confident ialit y ac ro s s the Inter net.
7.
What focuses on the accuracy and controls imposed on a company's financial
records?
a.
HIPAA
b.
GLBA
c.
SOX
d.
EU Data Protection Directive
8. What are components of managing the security infrastructure? (Select all that apply.)
a.
Security management policy
b.
Incident-handling policy
c.
Network access control policy
d.
None of the above
9. Which security legislative body calls for the protection of people's privacy?
a.
HIPAA
b.
GLBA
c.
EU Data Protection Directive
d.
SOX
Search WWH ::




Custom Search