Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Which of the following is described as an approach to network security in which each administrator is given sufficient privileges only within a limited scope

Which of the following is described as an approach to network security in which each administrator is given sufficient privileges only within a limited scope of responsibility?

A. Defense in depth

B. Fail-safe

C. Separation of duties

D. Simplicity

Flag question: Question 3

Which of the following can be described as putting each resource on a dedicated subnet behind a demilitarized zone (DMZ) and separating it from the internal local area network (LAN)?

A. N-tier deployment

B. Simplicity

C. Single defense

D. Virtual LAN (VLAN)

Flag question: Question 4

Question 41 pts

Alejandro is a cybersecurity contractor. He was hired by a Fortune 500 company to redesign its network security system, which was originally implemented when the company was a much smaller organization. The company's current solution is to use multiple firewall platforms from different vendors to protect internal resources. Alejandro proposes an infrastructure security method that, in addition to firewalls, adds tools such as an intrusion detection system (IDS), antivirus, strong authentication, virtual private network (VPN) support, and granular access control. What is this solution called?

A. Least privilege

B. Diversity of defense

C. N-tier deployment

D. Simplicity

Flag question: Question 5

Which of the following is an authentication method that supports smart cards, biometrics, and credit cards, and is a fully scalable architecture?

A. TACACS

B. RADIUS

C. Kerberos

D. 802.1x

Flag question: Question 6

What is the basic service of a reverse proxy?

A. Hides the identity of a client connecting to the Internet

B. Hides the identity of a web server accessed by a client over the Internet

C. Hides the identity of subnet hosts connecting to a database server

D. Hides the identity of hackers trying to defraud online retailers

Flag question: Question 7

The combination of certain techniques allows for relevant information collected by this solution from multiple systems and processes to be aggregated and analyzed for use in decision making. What is the name of this solution?

A. Security event management (SEM)

B. Security information and event management (SIEM)

C. Security information management (SIM)

D. Write-once read-many (WORM)

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Database Processing

Authors: David M. Kroenke, David Auer

11th Edition

B003Y7CIBU, 978-0132302678

More Books

Students also viewed these Databases questions

Question

Describe Balor method and give the chemical reaction.

Answered: 1 week ago

Question

How to prepare washing soda from common salt?

Answered: 1 week ago