ACME Security Architecture The boxes represent architectural “locations” where security controls might be put purchased from a security vendor and installed for protection.

Multiple Choice Questions >>> ACME Security Architecture The boxes represent architectural “locations” where security controls might be put purchased from a security vendor and installed for protection >>> Enterprise and Infrastructure Security

 

 

Correct! This location is an excellent place for all these traditional DMZ-type protections between the enterprise LAN and the ISP/Internet.

==================================

Correct! Servers and PCs can always benefit from better password protection, however weak the approach might be.

==================================

 

Correct! All locations are excellent places to benefit from the use of data encryption in some way.

==================================

Correct! All locations are excellent places to improve authentication in some way.

==================================

Correct! All locations are excellent places to improve authentication in some way.

==================================

Correct! The power of common frameworks such as NIST 800-53 rev 4 is that it can be levied across a hybrid, heterogeneous base.

==================================

Correct! ISPs have responsibility for border gateway security functionality, in conjunction with their customers.

==================================

Correct! These locations are an excellent place for cloud access security brokers.

Leave a Comment