00:00

QUESTION 16

Your organization has broken its network into several sections/segments, which are separated by firewalls, ACLs and VLANs. The purpose is to defend segments of the network from potential attacks that originate in a different segment or that attempt to spread across segments.
This style of defense-in-depth protection is best described as which of the following?

Correct Answer: B

QUESTION 17

The process of enumerating all hosts on a network defines which of the following activities?

Correct Answer: D

QUESTION 18

Which of the following statements about the authentication concept of information security management is true?

Correct Answer: D

QUESTION 19

Which of the following Unix syslog message priorities is the MOST severe?

Correct Answer: B

QUESTION 20

Which port category does the port 110 fall into?

Correct Answer: A