CIS 349 Course Great Wisdom / tutorialrank.com CIS 349 Course Great Wisdom / tutorialrank.com | Page 6
9)
There are two common types of monitoring tools
available for monitoring LANs, __________ and network
software log files.
10) Which control is used in the LAN Domain to protect the
confidentiality of data?
11) Which of the following is not typically a LAN Domain
component?
12) Which of the following is not a step to ensuring only
authorized users can see confidential data in the LAN Domain?