PROTECTION
"By using a _____________, our employees can securely access our company’s network remotely."

"By using a _____________, our employees can securely access our company’s network remotely."

PROTECTION

CORRECT

CORRECT

The answer is Virtual Private Network (VPN).

The answer is Virtual Private Network (VPN).

A VPN is a secured communication channel that typically uses encryption and is built atop another network, such as the Internet. Businesses that use a VPN to secure remote access to a corporate network are less vulnerable to certain threats, including those associated with using public Wi-Fi hotspots.
A VPN is a secured communication channel that typically uses encryption and is built atop another network, such as the Internet. Businesses that use a VPN to secure remote access to a corporate network are less vulnerable to certain threats, including those associated with using public Wi-Fi hotspots.
PROTECTION

INCORRECT

INCORRECT

The correct answer is Virtual Private Network (VPN).

The correct answer is Virtual Private Network (VPN).

A VPN is a secured communication channel that typically uses encryption and is built atop another network, such as the Internet. Businesses that use a VPN to secure remote access to a corporate network are less vulnerable to certain threats, including those associated with using public Wi-Fi hotspots.
PROTECTION

A ________________ system helps to ensure that known vulnerabilities throughout a network are identified and addressed. 

A ________________ system helps to ensure that known vulnerabilities throughout a network are identified and addressed. 
PROTECTION

CORRECT

CORRECT

The answer is patch management.

The answer is Patch management.

Patch management systems are used by companies to obtain, prioritize, validate, and install the various “patches” or code changes that are made available from the vendors of various applications and systems. Exploiting an unpatched vulnerability is one of the easiest and most common methods criminals use to compromise a computer system or network. 
Patch management systems are used by companies to obtain, prioritize, validate, and install the various “patches” or code changes that are made available from the vendors of various applications and systems. Exploiting an unpatched vulnerability is one of the easiest and most common methods criminals use to compromise a computer system or network. 
PROTECTION

INCORRECT

INCORRECT

The correct answer is Patch management.

The answer is patch management.

Patch management systems are used by companies to obtain, prioritize, validate, and install the various “patches” or code changes that are made available from the vendors of various applications and systems. Exploiting an unpatched vulnerability is one of the easiest and most common methods criminals use to compromise a computer system or network. 
PROTECTION

While passwords provide a basic level of protection, a much stronger control for securing access to your organization’s network is:

While passwords provide a basic level of protection, a much stronger control for securing access to your organization’s network is:
PROTECTION

CORRECT

CORRECT

The answer is Multi-Factor Authentication (MFA).

The answer is Multi-Factor Authentication (MFA).

MFA is an authentication tool that combines “something you know” (such as a password), “something you have” (such as a text message), and “something you are” (such as a fingerprint scan) to create a stronger access control than only requiring a password. MFA can prevent intruders from spreading across a network from a single compromised computer.
MFA is an authentication tool that combines “something you know” (such as a password), “something you have” (such as a text message), and “something you are” (such as a fingerprint scan) to create a stronger access control than only requiring a password. MFA can prevent intruders from spreading across a network from a single compromised computer.
PROTECTION

INCORRECT

INCORRECT

The correct answer is Multi-Factor Authentication (MFA).

The correct answer is Multi-Factor Authentication (MFA).

MFA is an authentication tool that combines “something you know” (such as a password), “something you have” (such as a text message), and “something you are” (such as a fingerprint scan) to create a stronger access control than only requiring a password. MFA can prevent intruders from spreading across a network from a single compromised computer.
PROTECTION

Many experts believe that one of the best ways to protect sensitive data during transmission is to use ______________:

Many experts believe that one of the best ways to protect sensitive data during transmission is to use ______________:
PROTECTION

CORRECT

CORRECT

The answer is encryption.

The answer is encryption.

Encryption is a method of encoding data so that only authorized parties who possess a decryption key can access the data. Encryption should be considered to protect any sensitive data that is being stored (“data at rest”) as well as data that is in transit (“data in motion”).
Encryption is a method of encoding data so that only authorized parties who possess a decryption key can access the data. Encryption should be considered to protect any sensitive data that is being stored (“data at rest”) as well as data that is in transit (“data in motion”).
PROTECTION

INCORRECT

INCORRECT

The correct answer is encryption.

The correct answer is encryption.

Encryption is a method of encoding data so that only authorized parties who possess a decryption key can access the data. Encryption should be considered to protect any sensitive data that is being stored (“data at rest”) as well as data that is in transit (“data in motion”).
PROTECTION

Which of the following services is not used to help a company identify gaps in its security controls?

Which of the following services is not used to help a company identify gaps in its security controls?

CORRECT

CORRECT

The answer is Cloud-based authentication.

The answer is Cloud-based authentication.

Cloud-based authentication can allow a company to consolidate and simplify its sign-on procedures, but is not generally used to identify gaps in a company’s security. Risk assessments, however, are widely recommended by cyber security professionals because risk assessments can provide a company with an overall evaluation of its security strategy and potential gaps. Penetration testing (“pen testing”) is also important in helping a company evaluate its cyber security by testing the company’s security against a hypothetical attacker.
Cloud-based authentication can allow a company to consolidate and simplify its sign-on procedures, but is not generally used to identify gaps in a company’s security. Risk assessments, however, are widely recommended by cyber security professionals because risk assessments can provide a company with an overall evaluation of its security strategy and potential gaps. Penetration testing (“pen testing”) is also important in helping a company evaluate its cyber security by testing the company’s security against a hypothetical attacker.

INCORRECT

INCORRECT

The correct answer is Cloud-based authentication.

The correct answer is Cloud-based authentication.

Cloud-based authentication can allow a company to consolidate and simplify its sign-on procedures, but is not generally used to identify gaps in a company’s security. Risk assessments, however, are widely recommended by cyber security professionals because risk assessments can provide a company with an overall evaluation of its security strategy and potential gaps. Penetration testing (“pen testing”) is also important in helping a company evaluate its cyber security by testing the company’s security against a hypothetical attacker.