Drag and drop the correct protocol to its default port.
Place the items in the list below in the correct order in which the forensic analyst should preserve them.
Drag and drop the appropriate security controls on the floor plan.
DRAG DROP
You have been tasked with designing a security plan for your company. Drag and drop the
appropriate security controls on the floor plan.
Instructions:All objects must be used and all place holders must be filled. Order does not
matter. When you have completed the simulation, please select the Done button to submit.
Select the appropriate attack from each drop down list to label the corresponding illustrated attack.
Select the appropriate authentication type for the following items:
Drag and Drop the applicable controls to each asset type.
DRAG DROP
A Security administrator wants to implement strong security on the company smart phones
and terminal servers located in the data center. Drag and Drop the applicable controls to
each asset type. Instructions: Controls can be used multiple times and not all placeholders
needs to be filled. When you have completed the simulation, Please select Done to submit.