Comprehensive Solutions
Save
Practice questions for this set
Learn 1 /7 Study with Learn
Distributed denial of service (DDoS)
Choose an answer
A brute-force password attack and the
What measures the average amount of
theft of a mobile worker's laptop are
1 2 time between failures for a particular
risks most likely found in which domain
system?
of a typical IT infrastructure?
In which domain of a typical IT
Which risk is most effectively mitigated
infrastructure is the first layer of
3 by an upstream Internet service 4
defense for a layered security
provider (ISP)?
strategy?
Don't know?
Terms in this set (40)
, A brute-force password Remote Access Domain
attack and the theft of a
mobile worker's laptop are
risks most likely found in
which domain of a typical IT
infrastructure?
Bob is the information Gramm-Leach-Bliley Act (GLBA)
security and compliance
manager for a financial
institution. Which regulation
is most likely to directly
apply to Bob's employer?
Chris is writing a document Procedure
that provides step-by-step
instructions for end users
seeking to update the
security software on their
computers. Performing
these updates is
mandatory. Which type of
document is Chris writing?
Devaki is capturing traffic 22
on her network. She
notices connections using
ports 20, 22, 23, and 80.
Which port normally hosts
a protocol that uses secure,
encrypted connections?
In which domain of a User Domain
typical IT infrastructure is
the first layer of defense for
a layered security strategy?
Juan's web server was 96.67%
down for an entire day in
April. It experienced no
other downtime during that
month. What represents the
web server uptime for that
month?