100% Correct Answers
Routers - CORRECT ANSWER✔✔Devices that manage network traffic by reading the source and
destination fields in information packet headers to determine the most efficient path through
the network for the packet to travel.
Switches - CORRECT ANSWER✔✔Devices that turn one network jack into several network jacks,
so multiple devices can share one network connection.
Modems - CORRECT ANSWER✔✔Devices receiving analog signals from the internet service
provider and translating those signals into digital signals. Each modem has a public IP address.
Gateways - CORRECT ANSWER✔✔Devices that act as an intermediary between different
networks transforming data from one protocol into another so that information can flow
between networks.
Server - CORRECT ANSWER✔✔A computer system that provides services, resources, or data to
other computers or devices on a network.
Firewall - CORRECT ANSWER✔✔A security device designed to monitor and control incoming
and outgoing network traffic based on predetermined security rules.
Public cloud model - CORRECT ANSWER✔✔owned and managed by CSP, made available for
purchase
Private cloud model - CORRECT ANSWER✔✔Created for a single org
, hybrid cloud model - CORRECT ANSWER✔✔2+ clouds, mixture of private and public
Community cloud model - CORRECT ANSWER✔✔Shared by multiple common organizations,
typically within the same industry
(T/F) the NIST CSF is voluntary - CORRECT ANSWER✔✔True
NIST tier 1: partial - CORRECT ANSWER✔✔risk management is ad hoc and reactive
NIST tier 2: Risk-informed - CORRECT ANSWER✔✔Prioritization based on org risk - may be
isolated from org processes
NIST tier 3: repeatable - CORRECT ANSWER✔✔utilizes cybersecurity in planning and has
documented procedures
NIST tier 4: adaptive - CORRECT ANSWER✔✔based on iterative improvement of incidents and is
responsive to evolving threats
FISMA - CORRECT ANSWER✔✔Requires the implementation of minimum controls to protect
federal info and IS
OMB - CORRECT ANSWER✔✔Requires controls for federal IS
NIST SP 800-53 audience: - CORRECT ANSWER✔✔Individuals with
- risk management and oversight responsibilities
-system development responsibilities
-logical or disposition-related
-security and privacy implementation and operations