Q. What action do you typically need to do to join a public network, such as one in a coffee shop?
Select one:
- Provide biometric information
- Agree to the legal terms for using the network
- Register your handheld device
- Submit your personal digital certificate
Q. How does NAC effectively segment a network?
Select one:
- Using IP addresses
- Routers
- Using user roles
- Utilizing device profiles
Q. Which security challenge do BYODs pose to networks?
Select one:
- Increase the maintenance cycle for network devices
- MIS does not control what is installed on these devices
- Limited RAM prevents the installation of security software
- Data exfiltration
Q. Why are IoT devices potential conduits of contagion?
Select one:
- Does not support two-factor authentication
- IoT devices are often cheaply made
- There are too many incompatible IoT security standards in use
- Not able to install security software
Q. Which three parties participate in network authentication, according to the IEEE 802.1X standards? (Choose three.)
Select one or more:
- Authenticator
- Authentication server
- Certification authority
- Router
- Client device
Q. What drives organizations to buy IoT devices?
Select one:
- Mandated by government
- Can save time and money
- Required as part of an air-gap solution
- Provide valuable data to the CFO
[FCF] Cybersecurity 2.0 - Lesson 03 : Sandbox (Quesion&Answer)
[FCF] Cybersecurity 2.0 - Lesson 04 : WAF (Quesion&Answer)