Saint COm520 week 6 quiz 3

Question # 00060848 Posted By: shortone Updated on: 04/11/2015 02:52 PM Due on: 04/29/2015
Subject Computer Science Topic General Computer Science Tutorials:
Question
Dot Image

Grade Details - All Questions

Question 1. Question : Which of the following controls do not primarily address the Availability tenet of security?

IDS/IPS

Performance monitors

Encryption

Anti-malware protection

Points Received: 0 of 1

Comments:

Question 2. Question : EFS allows security administrators to protect primarily which security tenet?

Availability

Integrity

Confidentiality

Nonrepudiation

Points Received: 1 of 1

Comments:

Question 3. Question : Which Windows Server 2008 R2 installation feature makes the process of building secure servers easier?

Virtual images

Windows Server editions

Windows Server roles

MBSA

Points Received: 1 of 1

Comments:

Question 4. Question : User authentication most commonly protects which two tenets of security?

Integrity and confidentiality

Confidentiality and availability

Integrity and availability

Availability and nonrepudiation

Points Received: 1 of 1

Comments:

Question 5. Question : Which policy would likely define the amount of time a user is locked out after entering the incorrect password 3 times?

Password policy

Account policy

Kerberos policy

Remote access policy

Points Received: 1 of 1

Comments:

Question 6. Question : Which term refers to the ongoing attention and care an organization places on security and compliance?

Regulatory compliance

Due Diligence

Due Care

Governance

Points Received: 1 of 1

Comments:

Question 7. Question : Which type of network cabling is the most common type in use today?

Coaxial

UTP

STP

Fiber optic

Points Received: 0 of 1

Comments:

Question 8. Question : Which is the best control to secure a network service that you only need for internal users?

Disable it

Remove it

Firewall

AppLocker

Points Received: 1 of 1

Comments:

Question 9. Question : What Microsoft Windows Server installation feature makes it easy to install only necessary programs and services?

Server core installation

Windows editions

Window registry

Windows Certificate Services

Points Received: 1 of 1

Comments:

Question 10. Question : Which Microsoft tool helps reduce a server’s attack surface after installing Windows Server 2008 R2?

Security Configuration Wizard

Group Policy Management Console

try

Perfmon

Points Received: 1 of 1

Comments:

Question 11. Question : What common network feature hides the true IP addresses of internal computers from outside nodes?

IDS

NAT

DHCP

ICMP

Points Received: 1 of 1

Comments:

Question 12. Question : Which among the following network devices connects two or more separate networks that use the same protocol?

Hub

Switch

Router

Gateway

Points Received: 1 of 1

Comments:

Question 13. Question : Which server application most commonly responds to requests from client applications such as Microsoft Internet Explorer or Mozilla Firefox?

Productivity Software

Application Server

Web Server

Database Server

Points Received: 1 of 1

Comments:

Question 14. Question : Firewalls are security controls used to address which type of security vulnerability?

Traffic flow

Physical access

Device security

Logical access

Points Received: 1 of 1

Comments:

Question 15. Question : Which of the following statements best describes what a firewall does to protect a network?

Filters traffic coming from an outside network to an internal network to exclude suspicious packets

Filters traffic coming from an internal network to an outside network to exclude suspicious packets

Examines traffic coming from an outside network to an internal network to detect suspicious packets

Filters traffic traveling in both directions (internal to external and external to internal) to exclude suspicious packets

Points Received: 1 of 1

Comments:

Question 16. Question : Which Microsoft feature in Windows Server 2008 R2 and Windows 7 (Ultimate and Enterprise) allows administrators to use GPOs to define approved paths from which users can execute programs?

BitLocker

AppLocker

PathProtector

ExecAdmin

Points Received: 0 of 1

Comments:

Question 17. Question : What is the common approach used to separate untrusted networks from trusted networks?

DMZ

Kerberos

Certificates

Encryption

Points Received: 1 of 1

Comments:

Question 18. Question : What is the difference between application software and operating system software?

Operating system software is any software from Microsoft, and application software comes from other vendors.

Operating systems require authentication while application software does not.

Operating system software allows users to interact with hardware, and application software allows users to perform specific tasks.

Operating system software is generally free, and application software generally has a licensing cost.

Points Received: 1 of 1

Comments:

Question 19. Question : What tool allows administrators to manually disable or remove unneeded services or programs?

MBSA

GPOAudit

try

SCW

Points Received: 0 of 1

Comments:

Question 20. Question : Which type of application attack involves accessing your application’s data outside the application?

Extra-application data access

Privilege escalation

Direct file access

Spoofing

Points Received: 0 of 1

Comments:

Dot Image
Tutorials for this Question
  1. Tutorial # 00056768 Posted By: shortone Posted on: 04/11/2015 02:53 PM
    Puchased By: 4
    Tutorial Preview
    The solution of Saint COm520 week 6 quiz 3...
    Attachments
    Com520_week_6_quiz.docx (102.8 KB)
    Recent Feedback
    Rated By Feedback Comments Rated On
    l...ey Rating Gives best advice and strategies 06/29/2016
    sk...l97 Rating Top-quality and reliable service 05/11/2015

Great! We have found the solution of this question!

Whatsapp Lisa