chapter 4 and 10 multiple choice dump of incorrect questions __________________ Q. 30 In Lauren’s initial design for a secure network, she applied the same security controls to every system and network. After reviewing her design, she decided to isolate systems based on their functions and to apply controls to protected network segments for more sensitive data and systems. What two design models did she apply? A. Threat analysis–based design, protected enclaves B. Uniform protection, threat analysis–based designYour selection is incorrect C. Information-based design, uniform protection D. Uniform protection, protected enclavesYour selection is incorrect ________________________ Q. 10 Which one of the following operating systems should be avoided on production networks? A. Windows Server 2003Your selection is incorrect B. Red Hat Enterprise Linux 7Your selection is incorrect C. CentOS 7 D. Ubuntu 16 SOLUTIONS A. Microsoft discontinued support for Windows Server 2003, and it is likely that the operating system contains unpatchable vulnerabilities. ________________________________ Q. 2 Which one of the CVSS metrics would contain information about the number of times that an attacker must successfully authenticate to execute an attack? A. AV B. CYour selection is incorrect C. AuYour selection is incorrect D. AC SOLUTIONS C. The authentication metric describes the authentication hurdles that an attacker would need to clear to exploit a vulnerability. _______________________________________