Answer:
You need to explain the entire network layout first.
Explanation:
Bringing on new IT Staff can be time consuming. But depending on the possession you need to explain to them how the domain lay out is.
Answer:
Available options in question are
- a firewall :
- a server
- an application
- control standard
Answer is : Control Standard. It is not an example of layer of security.
Explanation:
Defense in depth consists of three major domains like physical, technical and administrative. Layered Security will consists of best practices by combining multiple security methods to mitigate vulnerabilities and attack vectors. It is used to protect resources at different levels.
- A firewall is used as layered security measure to secure networks and systems.It is most commonly used security measure for enterprise products.
- A server is typical example of physical control. In this it protects actual IT servers, high-end servers, cloud servers and any physical hardware and assets.
- An Application can be used an example of Layer security. Applications like Antiviruses, Vulnerability Scanners, Anti Malware software and Web Application firewall gateways are typical examples
Control Standard is not an example of Layered Security.
Answer:
Device Health Attestation Services
Explanation:
Based on the scenario being described it can be said that the Windows Server role that can be used to automate this check is known as Device Health Attestation Services. This is a role that allows the administrator to automatically check if a device has the required trustworthy BIOS, TPM, or boot software enabled, as well as Bitlocker encryption.
Answer:
350 kHz
Explanation:
as there are 100,000 character per sec.
so, total number of bits per sec = 100,000 * n
= 100,000 * 7 = 700,000 bits per sec
= 700 kbps
Bandwidth (BW) = total no. of bits / 2
BW = 700 kbps/2
= 350 kHz