Question 1
What is the function of a digital signature in application-based segmentation?
Question 2
What compliance requirement mandates network segmentation for security purposes?
Question 3
Which type of segmentation would you use to separate users from accessing databases directly?
Question 4
What should be considered when configuring access control lists (ACLs)?
Question 5
Which ports can user James access based on the specified ACL permissions?
Question 6
Which feature restricts applications based on their installation directory?
Question 7
What is the main purpose of logical segmentation in networks?
Question 8
Why might physical segmentation be less suitable than logical segmentation for large enterprises?
Question 9
How can applications be controlled on Windows systems apart from use in deny/allow lists?
Question 10
What distinguishes an application deny list from an allow list?
Question 11
In an access control list, which element is NOT typically used as a criterion?
Question 12
How do ACLs help in strategic security planning?
Question 13
Which type of network segmentation is commonly used in cloud environments?
Question 14
Which ACL permission allows only specific users the right to execute certain applications?
Question 15
What is a common characteristic of network zones in terms of application rules?