Saint COm520 week 6 quiz 3

Grade Details - All Questions
Question 1. Question : Which of the following controls do not primarily address the Availability tenet of security?
IDS/IPS
Performance monitors
Encryption
Anti-malware protection
Points Received: 0 of 1
Comments:
Question 2. Question : EFS allows security administrators to protect primarily which security tenet?
Availability
Integrity
Confidentiality
Nonrepudiation
Points Received: 1 of 1
Comments:
Question 3. Question : Which Windows Server 2008 R2 installation feature makes the process of building secure servers easier?
Virtual images
Windows Server editions
Windows Server roles
MBSA
Points Received: 1 of 1
Comments:
Question 4. Question : User authentication most commonly protects which two tenets of security?
Integrity and confidentiality
Confidentiality and availability
Integrity and availability
Availability and nonrepudiation
Points Received: 1 of 1
Comments:
Question 5. Question : Which policy would likely define the amount of time a user is locked out after entering the incorrect password 3 times?
Password policy
Account policy
Kerberos policy
Remote access policy
Points Received: 1 of 1
Comments:
Question 6. Question : Which term refers to the ongoing attention and care an organization places on security and compliance?
Regulatory compliance
Due Diligence
Due Care
Governance
Points Received: 1 of 1
Comments:
Question 7. Question : Which type of network cabling is the most common type in use today?
Coaxial
UTP
STP
Fiber optic
Points Received: 0 of 1
Comments:
Question 8. Question : Which is the best control to secure a network service that you only need for internal users?
Disable it
Remove it
Firewall
AppLocker
Points Received: 1 of 1
Comments:
Question 9. Question : What Microsoft Windows Server installation feature makes it easy to install only necessary programs and services?
Server core installation
Windows editions
Window registry
Windows Certificate Services
Points Received: 1 of 1
Comments:
Question 10. Question : Which Microsoft tool helps reduce a server’s attack surface after installing Windows Server 2008 R2?
Security Configuration Wizard
Group Policy Management Console
try
Perfmon
Points Received: 1 of 1
Comments:
Question 11. Question : What common network feature hides the true IP addresses of internal computers from outside nodes?
IDS
NAT
DHCP
ICMP
Points Received: 1 of 1
Comments:
Question 12. Question : Which among the following network devices connects two or more separate networks that use the same protocol?
Hub
Switch
Router
Gateway
Points Received: 1 of 1
Comments:
Question 13. Question : Which server application most commonly responds to requests from client applications such as Microsoft Internet Explorer or Mozilla Firefox?
Productivity Software
Application Server
Web Server
Database Server
Points Received: 1 of 1
Comments:
Question 14. Question : Firewalls are security controls used to address which type of security vulnerability?
Traffic flow
Physical access
Device security
Logical access
Points Received: 1 of 1
Comments:
Question 15. Question : Which of the following statements best describes what a firewall does to protect a network?
Filters traffic coming from an outside network to an internal network to exclude suspicious packets
Filters traffic coming from an internal network to an outside network to exclude suspicious packets
Examines traffic coming from an outside network to an internal network to detect suspicious packets
Filters traffic traveling in both directions (internal to external and external to internal) to exclude suspicious packets
Points Received: 1 of 1
Comments:
Question 16. Question : Which Microsoft feature in Windows Server 2008 R2 and Windows 7 (Ultimate and Enterprise) allows administrators to use GPOs to define approved paths from which users can execute programs?
BitLocker
AppLocker
PathProtector
ExecAdmin
Points Received: 0 of 1
Comments:
Question 17. Question : What is the common approach used to separate untrusted networks from trusted networks?
DMZ
Kerberos
Certificates
Encryption
Points Received: 1 of 1
Comments:
Question 18. Question : What is the difference between application software and operating system software?
Operating system software is any software from Microsoft, and application software comes from other vendors.
Operating systems require authentication while application software does not.
Operating system software allows users to interact with hardware, and application software allows users to perform specific tasks.
Operating system software is generally free, and application software generally has a licensing cost.
Points Received: 1 of 1
Comments:
Question 19. Question : What tool allows administrators to manually disable or remove unneeded services or programs?
MBSA
GPOAudit
try
SCW
Points Received: 0 of 1
Comments:
Question 20. Question : Which type of application attack involves accessing your application’s data outside the application?
Extra-application data access
Privilege escalation
Direct file access
Spoofing
Points Received: 0 of 1
Comments:

-
Rating:
5/
Solution: Saint COm520 week 6 quiz 3