CIS 349 Education Begins/newtonhelp.com

Page 4

15) One particular type of network security testing simulates actions an attacker would take to attack your network. This is known as:

16) You have the least amount of control over who accesses data in the ______ Domain.

17) What is the primary type of control used to protect data in the WAN Domain?

18) What is a best practice for compliance in the WAN Domain?

19) The Remote Access Domain server components also generally reside in the ___________ environment, even though they still belong to the Remote Access Domain.

20) Which of the following is primarily a corrective control in the Remote Access Domain?


Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.