CIS 349 RANK Great Stories/cis349rank.com CIS 349 RANK Great Stories/cis349rank.com | Page 7

11) Which of the following is not typically a LAN Domain component? 12) Which of the following is not a step to ensuring only authorized users can see confidential data in the LAN Domain? 13) A nonintrusive penetration test ____________. 14) What is a corrective control in the LAN-to-WAN Domain? 15) One particular type of network security testing simulates actions an attacker would take to attack your network. This is known as: 16) The __________ is a generic description for how computers use seven layers of protocol rules to communicate across a network. 17) Although __________ are not optimal for high bandwidth, large- volume network transfers, they work very well in most environments where you need to maintain connections between several other networks. 18) What is the primary type of control used to protect data in the WAN Domain?