1: | What is the difference between a closed network and an open network? |
2: | Define a security policy. |
3: | Name three reasons why a company should have a security policy. |
4: | Name at least four key components that a good security policy should contain. |
5: | Name the two philosophies that can be adopted when defining a security plan. |
6: | Which individuals should be involved when creating a security policy? |
7: | Give the four stages of the security wheel. |
8: | Which security solutions can be implemented to stop or prevent unauthorized access and to protect information? |
9: | Explain the monitoring phase of the security wheel. |
10: | Write a security policy (similar to the VPN policy) for password protection. |