Accounting
Anthropology
Archaeology
Art History
Banking
Biology & Life Science
Business
Business Communication
Business Development
Business Ethics
Business Law
Chemistry
Communication
Computer Science
Counseling
Criminal Law
Curriculum & Instruction
Design
Earth Science
Economic
Education
Engineering
Finance
History & Theory
Humanities
Human Resource
International Business
Investments & Securities
Journalism
Law
Management
Marketing
Medicine
Medicine & Health Science
Nursing
Philosophy
Physic
Psychology
Real Estate
Science
Social Science
Sociology
Special Education
Speech
Visual Arts                                        
                                    Question
Ingress ACL rules typically permit a specific type of internally originated connection to outside resources.Answer
This answer is hidden. It contains 5 characters.
Related questions
                                            Q: 
                                            ________ is the act of actually stopping an incident's damage.
A) Disconnection
B) Gapping
C) Containment
D) Termination                                        
                                    
                                            Q: 
                                            ________ allows a response team to determine an incident's damage potential and to gather information needed to begin containment and recovery.
A) Detection
B) Analysis
C) Both A and B
D) Neither A nor B                                        
                                    
                                            Q: 
                                            Live tests are ________.
A) more effective than walkthroughs
B) inexpensive
C) Both A and B
D) Neither A nor B                                        
                                    
                                            Q: 
                                            A walkthrough is also called a ________.
A) table-top exercise
B) live test
C) Both A and B
D) Neither A nor B                                        
                                    
                                            Q: 
                                            A CSIRT should not include members from the legal department.                                        
                                    
                                            Q: 
                                            Successful attacks are commonly called ________.
A) security incidents
B) countermeasures
C) Both A and B
D) Neither A nor B                                        
                                    
                                            Q: 
                                            Wal-Mart was able to respond to hurricane Katrina so quickly because it had ________.
A) detailed business continuity plans
B) a full-time director of business continuity
C) Both A and B
D) Neither A nor B                                        
                                    
                                            Q: 
                                            Hot sites ________.
A) are more expensive than CDP
B) Lose less data during a disaster than CDP
C) Both A and B
D) Neither A nor B                                        
                                    
                                            Q: 
                                            A router can be a NIDS.                                        
                                    
                                            Q: 
                                            In ________ transfers, each event's data goes to the manager immediately.
A) batch
B) real-time
C) Both A and B
D) Neither A nor B                                        
                                    
                                            Q: 
                                            A ________ IDS sends data from many devices at a central management console.
A) centralized
B) distributed
C) fragmented
D) decentralized                                        
                                    
                                            Q: 
                                            18 U.S.C. 2511 prohibits ________.
A) the interception of electronic messages
B) hacking
C) Both A and B
D) Neither A nor B                                        
                                    
                                            Q: 
                                            18 U.S.C. 1030 protects ________.
A) all computers
B) "protected computers" such as government computers
C) Both A and B
D) Neither A nor B                                        
                                    
                                            Q: 
                                            18 U.S.C. 1030 prohibits ________.
A) hacking
B) malware attacks
C) denial-of-service attacks
D) All of the above                                        
                                    
                                            Q: 
                                            Courts will often admit unreliable evidence if judges believe that juries can be trusted to evaluate it properly.                                        
                                    
                                            Q: 
                                            The prosecutor must demonstrate ________ at the time of the action at the center of a criminal trial.
A) reasonable doubt
B) mens rea
C) Both A and B
D) Neither A nor B                                        
                                    
                                            Q: 
                                            ________ deals with the violation of criminal statutes.
A) Criminal law
B) Civil law
C) Both A and B
D) Neither A nor B                                        
                                    
                                            Q: 
                                            Black holing is an effective long-term containment solution.                                        
                                    
                                            Q: 
                                            Disconnection ________.
A) is the most decisive way to do termination
B) harms legitimate users
C) Both A and B
D) Neither A nor B                                        
                                    
                                            Q: 
                                            After wiping/clearing, data is ________.
A) recoverable
B) reusable
C) Both A and B
D) Neither A nor B                                        
                                    
                                            Q: 
                                            One of the most often overlooked mechanisms used to reduce data loss is employee training.                                        
                                    
                                            Q: 
                                            Companies address the risk of losing a security key by using ________.
A) encryption key resets
B) key escrow
C) Both A and B
D) Neither A nor B                                        
                                    
                                            Q: 
                                            DML triggers are used to ________.
A) maliciously attack databases
B) produce automatic responses if the structure of the database has been altered.
C) Both A and B
D) Neither A nor B                                        
                                    
                                            Q: 
                                            Retaining data can create negative consequences.                                        
                                    
                                            Q: 
                                            From a legal standpoint, loss of encrypted data comes with negligible risk from the loss private information.                                        
                                    
                                            Q: 
                                            Who should be involved in the creation of retention policies?
A) Business units
B) The legal department
C) Both A and B
D) Neither A nor B                                        
                                    
                                            Q: 
                                            Backup media should be encrypted.                                        
                                    
                                            Q: 
                                            With RAID 5, the following is achieved ________.
A) Parity
B) Striping
C) Redundancy
D) All of the above                                        
                                    
                                            Q: 
                                            Optical disks can safely hold data for decades.                                        
                                    
                                            Q: 
                                            Mesh backup is where client PCs in an organization back up each other.