Saint COm520 week 2 quiz 1 -100% correct

Question # 00054484 Posted By: shortone Updated on: 03/10/2015 12:26 PM Due on: 03/31/2015
Subject Computer Science Topic General Computer Science Tutorials:
Question
Dot Image

Question 1.1.What is the primary benefit of using kernel loadable modules? (Points : 1)

Easier to secure
Uses less disk space
Reduces the kernel’s memory footprint
Allows more security controls

Question 2.2.Which of the following best defines an ACL? (Points : 1)

Collection of authentication credentials
List of user rights
Collection of previous passwords
List of access permissions

Question 3.3.Which Windows kernel mode component provides the actual access to physical hardware? (Points : 1)

HAL
Executive
Kernel mode drivers
Microkernel

Question 4.4.Which term refers to a countermeasure that defines how users should create passwords? (Points : 1)

Detective security control
Physical security control
Administrative security control
Corrective security control

Question 5.5.Which GPO feature allows you to apply a GPO to a defined set of users? (Points : 1)

Policy constraint
Domain scope
GPO query
Security filter

Question 6.6.Who holds the ultimate responsibility for the security of an organization’s IT assets? (Points : 1)

Users
IT operations personnel
IT security personnel
Management

Question 7.7.The Windows Group Policy feature provides the ability to define and apply which type(s) of settings to one or more computers? (Points : 1)

Application configuration only
Security configuration only
General configuration only
General and security configurations

Question 8.8.In which token does Windows store all the security identifiers (SIDs) for a process? (Points : 1)

SID list
SAT
BSS
UAC

Question 9.9.In which process would a user be asked to enter a token-generated password? (Points : 1)

Authentication
Authorization
Nonrepudiation
Validation

Question 10.10.Which term refers to the collection of all exposed vulnerabilities? (Points : 1)

Multilayered exposure
Exposure to attack
Vulnerability set
Attack surface

Question 11.11.Which run mode allows processes to access more restricted parts of a computer system? (Points : 1)

User
Supervisor
Enhanced
Super

Question 12.12.Which Windows feature prompts users before escalating to administrator privileges? (Points : 1)

SAT
DACL
SID
UAC

Question 13.13.Which of the following approaches represents the best use of Group Policy? (Points : 1)

Group Policy works better in Active Directory and GPOs should concentrate on enterprise-
wide settings.
GPOs provide input to the creation of the organization’s security policy.
Group Policy is more efficient at the local level and GPOs should concentrate on computer-
specific settings.
GPOs exist to directly support the organization’s security policy.

Question 14.14.Which Windows command-line utility allows administrators to change access controls settings? (Points : 1)

attrib
wbadmin
appcmd
icacls

Question 15.15.A security token is which type of authentication? (Points : 1)

Type I
Type II
Type III
Hybrid

Question 16.16.Which default Windows group provides only limited administrative rights, including the ability to install software? (Points : 1)

Administrators
Guests
Users
Power Users

Question 17.17.What is the primary motivation for using the defense in depth approach to security? (Points : 1)

Attackers generally will give up if their initial attack fails.
No single action, rule, or device can protect a resource from attack.
Attackers know about too many vulnerabilities to protect against them all.
Defense in depth helps to hide resources from external access.

Question 18.18.Which of the following control types is the best way to categorize a door with an electronic lock? (Points : 1)

Technical, preventative
Technical, corrective
Physical, preventative
Physical, detective

Question 19.19.Which of the following well-known attacks used a worm to exploit vulnerabilities in Microsoft Internet Information Services (IIS) starting in July 2001? (Points : 1)

Stuxnet
Conficker
SQL Slammer
Code Red

Question 20.20.What is the common name of the United States Department of Defense Trusted Computer System Evaluation Criteria? (Points : 1)

Rainbow Series
Orange Book
TCSEC
Common Criteria

Dot Image
Tutorials for this Question
  1. Tutorial # 00050824 Posted By: shortone Posted on: 03/10/2015 12:27 PM
    Puchased By: 4
    Tutorial Preview
    The solution of Saint COm520 week 2 quiz 1 -100% correct...
    Attachments
    com520_quiz_1.docx (103.31 KB)
    Recent Feedback
    Rated By Feedback Comments Rated On
    Ph...pt1 Rating Provide best and satisfactory work 08/10/2016

Great! We have found the solution of this question!

Whatsapp Lisa