Matching
Match each statement with the correct term below.
Premises:
Additional product functionality that wasn’t included in the original release
Connections from the Internet from customers, remote employees, or trusted business partners
A dedicated application that can be installed on a server to perform as a firewall
Collections of updates and fixes that often include additional features
Connections on the internal network from company-owned resources and employees
Identify traffic and protocols that are allowed to and from the perimeter network
Connections from the Internet
The process of making a system more secure from the default configuration
Added as a buffer between an internal protected network and an external unprotected network
Responses:
trusted
feature packs
hardening
system policy rules
untrusted
perimeter network
ISA Server
service packs
semi-trusted
Correct Answer:
Premises:
Responses:
Additional product functionality that wasn’t included in the original release
Connections from the Internet from customers, remote employees, or trusted business partners
A dedicated application that can be installed on a server to perform as a firewall
Collections of updates and fixes that often include additional features
Connections on the internal network from company-owned resources and employees
Identify traffic and protocols that are allowed to and from the perimeter network
Connections from the Internet
The process of making a system more secure from the default configuration
Added as a buffer between an internal protected network and an external unprotected network
Premises:
Additional product functionality that wasn’t included in the original release
Connections from the Internet from customers, remote employees, or trusted business partners
A dedicated application that can be installed on a server to perform as a firewall
Collections of updates and fixes that often include additional features
Connections on the internal network from company-owned resources and employees
Identify traffic and protocols that are allowed to and from the perimeter network
Connections from the Internet
The process of making a system more secure from the default configuration
Added as a buffer between an internal protected network and an external unprotected network
Responses:
Related Questions
Q32: _ are a group of updates used
Q33: _ are software components designed to support
Q34: _ rules are commonly used to publish
Q35: List and describe two areas that should
Q36: Explain how to install WSUS.
Q37: The scwcmd command _ is used to
Q38: List and explain one concern when considering
Q39: When you run SCW, it creates a
Q40: Discuss options for creating a perimeter network.
Q41: Describe the purpose of the WSUS statistics
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents