Questions And Answers 100% Correct
Match each description on the left with the corresponding term on the right.
The guidelines put forth to secure a secret word or code that is used to serve as a security
measure against unauthorized access to data.
- Access
- Closing Unnecessary/Unneeded Ports
- File Management
- Password Standards and Requirements
- Shutting Down Unnecessary/Unneeded Services
- Vulnerability Scanning Password Standards and Requirements
Match each description on the left with the corresponding term on the right.
Copying, renaming, relocating, and deleting documents in the computer.
, CYB 230 - Week 4 - 4-0 Knowledge Check
Questions And Answers 100% Correct
- Access
- Closing Unnecessary/Unneeded Ports
- File Management
- Password Standards and Requirements
- Shutting Down Unnecessary/Unneeded Services
- Vulnerability Scanning File Management
Match each description on the left with the corresponding term on the right.
Stopping the flow of unwanted traffic through communication portals within a computer or
network device.
- Access
- Closing Unnecessary/Unneeded Ports
- File Management