1.
When should a wireless security policy be initially written?
After a company decides to implement wireless and before it is installed
When the next generation of wireless technology is launched
When the vendor presents wireless solutions to the business
When the industry publishes new wireless standards
2.
Information used to open or access a bank account is generally considered PII data True
False
3.
A weakness is found in a system's configuration which could expose client data to unauthorized users. Which of the following best describes the problem?
A new threat was discovered
A new vulnerability was discovered
A new risk was discovered
A and B
B and C
A, B, and C
4.
Where is a DMZ usually located? Within the WAN
Within the Mail Server
Inside the Private LAN
Between the private LAN and the public WAN
5.
What kind of workstation management refers to knowing what software is installed?