Information Technology Reference
In-Depth Information
10. How can attackers obtain sensitive account information? (Select all that apply.)
a.
Password-cracking utilities
b.
Capturing network traffic
c.
Social engineering
d.
All of the above
11. What best describes how to protect data's integrity?
a.
System availability
b.
Data confidentiality
c.
Ensuring that only legitimate users can view sensitive data
d.
Allowing only authorized users to modify data
12. What provides an audit trail of network activities?
a.
Authentication
b.
Accounting
c.
Authorization
d.
SSHv1
13. What authenticates valid DHCP servers to ensure unauthorized host systems are not
from interfering with production systems?
14. What contains the organization's procedures, guidelines, and standards?
15. How can you enforce access control? (Select all that apply.)
a.
Restrict access using VLANs
b.
Restrict access using OS-based controls
c.
Use encryption techniques
d.
All of the above
16. What is a general user document that is written in simple language to describe the
roles and responsibilities within risk management?
17. Tr ue or fals e: The net work acce s s cont rol polic y define s the general acce s s cont rol
principles used and how data is classified, such as confidential, top secret, or internal.
Search WWH ::




Custom Search