There are several types of domains in the IT infrastructure. Which of the following is not one of
these domains? - Answers VPN
_______________ is a measurement that quantifies how much information can be transmitted
over the network. - Answers Bandwidth
The _______________ domain refers to any endpoint device used by end users, which includes but
is not limited to mean any smart device in the end user's physical possession and any device
accessed by the end user, such as a smartphone, laptop, workstation, or mobile device -
Answers workstation
A typical data leakage protection program provides several layers of defense to prevent
confidential data from leaving the organization. Which of the following is not one of the layers
of defense? - Answers self-regulation
Many organizations have a(n) _____________ policy in place to manage the business concern of
how to handle sensitive information in physical form, such as reports. This policy generally
requires employees to lock up all documents and digital media at the end of a workday and
when not in use - Answers clean desk
In recent years, ___________________ has emerged as major technology. It provides a way of
buying software, infrastructure, and platform services on someone else's network. - Answers
cloud computing
The concept of _________________ comes from the acknowledgment that data changes form and
often gets copied, moved, and stored in many places. Sensitive data often leaves the protection
of application databases and ends up in e-mails, spreadsheets, and personal workstation files. -
Answers data loss protection
A key component to IT security is authorization, which is especially important in large, complex
organizations with thousands of employees and hundreds of systems. Two methods of
authorization are role based access control (RBAC) and attribute based access control (ABAC).
Although RBAC and ABAC can provide the same access, which of the following is an advantage
of ABAC? - Answers In ABAC, roles are expressed more in business terms and thus may be
more understandable.
Remote authentication has always been a concern because the person is coming from a public
network, and many companies require two-factor authentication for remote access. Which of
the following is not one of the most commonly accepted types of credentials? - Answers
something you want to know
Bring Your Own Device (BYOD) is a current trend within many organizations, which raises a host
of security policy questions that must be addressed for handheld device use. Which of the