Question


a. extranet f. search warrant
b. network assets g. subpoena
c. privileged access policy h. tunneling protocols
d. risk management i. two-factor authentication
e. role-based authentication j. vulnerabilities
1/ a process of analyzing the threats an organization faces
2/ a legal document that requires a person to appear in court, provide testimony,or cooperate with law enforcement
3/ situations or conditions that increase threats, which in turn increase risk
4/ a method of authentication that grants users limited system access based on their assigned role in the company
5/ authentication that requires more than one form of verification for a user to be granted access
6/ routers, cables, bastion hosts, servers, and firewall components that enable employees to communicate with one another
7/ a legal document issued by a court that allows authorities to search a particular place for specific evidence
8/ a private network that a company sets up as an extension of its corporate intranet
9/ network protocols that encapsulate (wrap) one protocol or session inside another
10/ a document that details additional access options and responsibilities of users with privileged access to resources

Answer

This answer is hidden. It contains 31 characters.