ExamGecko
Question list
Search
Search

List of questions

Search

Question 91 - CCAK discussion

Report
Export

Network environments and virtual instances shall be designed and configured to restrict and monitor traffic between trusted and untrusted connections. These configurations shall be reviewed at least annually, and supported by a documented justification for use for all allowed services, protocols, ports, and by compensating controls. Which of the following controls BEST matches this control description?

A.
Network Security
Answers
A.
Network Security
B.
Change Detection
Answers
B.
Change Detection
C.
Virtual Instance and OS Hardening
Answers
C.
Virtual Instance and OS Hardening
D.
Network Vulnerability Management
Answers
D.
Network Vulnerability Management
Suggested answer: A

Explanation:

Reference: https://csf.tools/reference/cloud-controls-matrix/version-3-0-1/ivs/

asked 18/09/2024
Isidre Piguillem
42 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first