Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Question 1 6 ( 1 point ) Devaki is capturing traffic on her network. She notices connections using ports 2 0 , 2 2 ,

Question 16(1 point)
Devaki is capturing traffic on her network. She notices connections using ports 20,22,23, and 80. Which port normally hosts a protocol that uses secure, encrypted connections?
Question 16 options:
20
22
23
80
Question 17(1 point)
What is a primary risk to the Workstation Domain, the Local Area Network (LAN) Domain, and the System/Application Domain?
Question 17 options:
Unauthorized access to systems
Unauthorized network probing and port scanning
Mobile worker token or other authentication stolen
Downtime of IT systems for an extended period after a disaster
Question 18(1 point)
A brute-force password attack and the theft of a mobile worker's laptop are risks most likely found in which domain of a typical IT infrastructure?
Question 18 options:
User Domain
Workstation Domain
Remote Access Domain
Local Area Network (LAN) Domain
Question 19(1 point)
Maria is writing a policy that defines her organization's data classification standard. The policy designates the IT assets that are critical to the organization's mission and defines the organization's systems, uses, and data priorities. It also identifies assets within the seven domains of a typical IT infrastructure. Which policy is Maria writing?
Question 19 options:
Security awareness policy
Asset classification policy
Asset protection policy
Asset management policy
Question 20(1 point)
Chris is writing a document that provides step-by-step instructions for end users seeking to update the security software on their computers. Performing these updates is mandatory. Which type of document is Chris writing?
Question 20 options:
Policy
Standard
Guideline
Procedure

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access with AI-Powered Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Students also viewed these Databases questions

Question

LO 124 How much do we daydream?

Answered: 1 week ago