CIS 349 RANK Great Stories/cis349rank.com CIS 349 RANK Great Stories/cis349rank.com | Page 7
11) Which of the following is not typically a LAN Domain component?
12) Which of the following is not a step to ensuring only authorized
users can see confidential data in the LAN Domain?
13) A nonintrusive penetration test ____________.
14) What is a corrective control in the LAN-to-WAN Domain?
15) One particular type of network security testing simulates actions
an attacker would take to attack your network. This is known as:
16) The __________ is a generic description for how computers use
seven layers of protocol rules to communicate across a network.
17) Although __________ are not optimal for high bandwidth, large-
volume network transfers, they work very well in most environments
where you need to maintain connections between several other
networks.
18) What is the primary type of control used to protect data in the
WAN Domain?