11 which of the following is an example of a corrective control a physical access co 4306156

11 which of the following is an example of a corrective control a physical access co 4306156

11) Which of the following is an example of a corrective control?

A) Physical access controls

B) Encryption

C) Intrusion detection

D) Incident response teams

12) Which of the following is not a requirement of effective passwords?

A) Passwords should be changed at regular intervals.

B) Passwords should be no more than 8 characters in length.

C) Passwords should contain a mixture of upper and lowercase letters, numbers and characters.

D) Passwords should not be words found in dictionaries.

13) Multi-factor authentication

A) involves the use of two or more basic authentication methods.

B) is a table specifying which portions of the systems users are permitted to access.

C) provides weaker authentication than the use of effective passwords.

D) requires the use of more than one effective password.

14) An access control matrix

A) does not have to be updated.

B) is a table specifying which portions of the system users are permitted to access.

C) is used to implement authentication controls.

D) matches the user's authentication credentials to his authorization.

15) Perimeter defense is an example of which of the following preventive controls that are necessary to provide adequate security?

A) Training

B) Controlling physical access

C) Controlling remote access

D) Host and application hardening

16) Which of the following preventive controls are necessary to provide adequate security for social engineering threats?

A) Controlling remote access

B) Encryption

C) Host and application hardening

D) Awareness training

17) A special purpose hardware device or software running on a general purpose computer, which filters information that is allowed to enter and leave the organization's information system, is known as a(n)

A) demilitarized zone.

B) intrusion detection system.

C) intrusion prevention system.

D) firewall.

18) This protocol specifies the procedures for dividing files and documents into packets to be sent over the Internet.

A) Access control list

B) Internet protocol

C) Packet switching protocol

D) Transmission control protocol

19) This protocol specifies the structure of packets sent over the internet and the route to get them to the proper destination.

A) Access control list

B) Internet protocol

C) Packet switching protocol

D) Transmission control protocol

20) This network access control determines which IP packets are allowed entry to a network and which are dropped.

A) Access control list

B) Deep packet inspection

C) Stateful packet filtering

D) Static packet filtering

Looking for a similar assignment? Get help from our qualified experts!

Order Now

Related Posts