50 POINTS!!
The increase in WFA Work From Anywhere and WFH Work From Home connectivity presents challenges for security services to identify and protect additional threat vectors. Select True or False.
Select one:
a.True
b.False
Many applications are designed to circumvent traditional port-based firewalls using the following techniques EXCEPT one.
Select one:
a. Hiding within SSL encryption
b. Use of non-standard ports
c. Port hopping
d. Tunneling within commonly used services
e. Command and Control C2 via virtual machine services
Choose the best definition of Ubiquity.
Select one:
a. Content is accessible by multiple applications, some devices are connected to the web, and the services can be used locally.
b. Content is accessible by multiple applications, every device is connected to the web, and the services can be used everywhere.
c. Content is accessible by select applications, some devices are connected to the web, and the data can be used everywhere.
d. Services are accessible by multiple applications, every device is connected to the web, and the services can be used everywhere
PCI DSS is mandated and administered by the?
Select one:
a. United Nations - UN
b. PCI Security Standards Council - SSC
c. European Union - EU
d. U.S. Federal Government