Question: Question 1 6 ( 1 point ) Devaki is capturing traffic on her network. She notices connections using ports 2 0 , 2 2 ,

Question 16(1 point)
Devaki is capturing traffic on her network. She notices connections using ports 20,22,23, and 80. Which port normally hosts a protocol that uses secure, encrypted connections?
Question 16 options:
20
22
23
80
Question 17(1 point)
What is a primary risk to the Workstation Domain, the Local Area Network (LAN) Domain, and the System/Application Domain?
Question 17 options:
Unauthorized access to systems
Unauthorized network probing and port scanning
Mobile worker token or other authentication stolen
Downtime of IT systems for an extended period after a disaster
Question 18(1 point)
A brute-force password attack and the theft of a mobile worker's laptop are risks most likely found in which domain of a typical IT infrastructure?
Question 18 options:
User Domain
Workstation Domain
Remote Access Domain
Local Area Network (LAN) Domain
Question 19(1 point)
Maria is writing a policy that defines her organization's data classification standard. The policy designates the IT assets that are critical to the organization's mission and defines the organization's systems, uses, and data priorities. It also identifies assets within the seven domains of a typical IT infrastructure. Which policy is Maria writing?
Question 19 options:
Security awareness policy
Asset classification policy
Asset protection policy
Asset management policy
Question 20(1 point)
Chris is writing a document that provides step-by-step instructions for end users seeking to update the security software on their computers. Performing these updates is mandatory. Which type of document is Chris writing?
Question 20 options:
Policy
Standard
Guideline
Procedure

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!