ANSWERS 100% CORRECT
FALL-2022 SOLUTION
GUARANTEED GRADE A+ 2 out of 2 points
•
• Question 1
Web Services policies would be an example of domain.
Selected WA
Answer: N
• Question 2
techniques can provide a security baseline for full operating systems and
applications?
Selected Imagin
Answer: g
• Question 3
2 out of 2 points
Two-factor authentication is a typical control used by employees to remotely access
which of the following?
Selected LA
Answer: N
• Question 4
2 out of 2 points
Employer response to an employee posting company passwords on their social network
site should include ?
Selected B and C
Answer: only
• Question 5
2 out of 2 points
, Simple security policy awareness requires that report suspicious activity?
Selected All of the
Answer: above
• Question 6
2 out of 2 points
Which of the following does an acceptable use policy relate to?
Selected Users accessing the
Answer: Internet
• Question 7
2 out of 2 points
Security experts consider the weakest link in security.
Selected Peopl
Answer: e
• Question 8
2 out of 2 points
Which of the following includes guidelines under the LAN domain policies?
Selected IDS and IPS architecture and
Answer: management
• Question 9
2 out of 2 points
Data classification for retention of information is typically for financial and tax
records?
Selected 7
Answer: years
• Question 10
2 out of 2 points
The following documents help capture domain security control requirements?
Selected Control,
Answer: baseline
• Question 11
2 out of 2 points
A can identify hosts on a network and determine services running on the hosts.
Selected Network
Answer: scanner
• Question 12
2 out of 2 points
The signs of an incident can be ?