Chat with us, powered by LiveChat saint com520 all modules quizes [ quiz 1,2,3 and 4 ] | Writedemy

saint com520 all modules quizes [ quiz 1,2,3 and 4 ]

saint com520 all modules quizes [ quiz 1,2,3 and 4 ]

Question

Question 1.1.What is the primary benefit of using kernel loadable modules? (Points : 1)

 Easier to secure
 Uses less disk space
 Reduces the kernel’s memory footprint
 Allows more security controls

Question 2.2.Which of the following best defines an ACL? (Points : 1)

 Collection of authentication credentials
 List of user rights
 Collection of previous passwords
 List of access permissions

Question 3.3.Which Windows kernel mode component provides the actual access to physical hardware? (Points : 1)

 HAL
 Executive
 Kernel mode drivers
 Microkernel

Question 4.4.Which term refers to a countermeasure that defines how users should create passwords? (Points : 1)

 Detective security control
 Physical security control
 Administrative security control
 Corrective security control

Question 5.5.Which GPO feature allows you to apply a GPO to a defined set of users? (Points : 1)

 Policy constraint
 Domain scope
 GPO query
 Security filter

Question 6.6.Who holds the ultimate responsibility for the security of an organization’s IT assets? (Points : 1)

 Users
 IT operations personnel
 IT security personnel
 Management

Question 7.7.The Windows Group Policy feature provides the ability to define and apply which type(s) of settings to one or more computers? (Points : 1)

 Application configuration only
 Security configuration only
 General configuration only
 General and security configurations

Question 8.8.In which token does Windows store all the security identifiers (SIDs) for a process? (Points : 1)

 SID list
 SAT
 BSS
 UAC

Question 9.9.In which process would a user be asked to enter a token-generated password? (Points : 1)

 Authentication
 Authorization
 Nonrepudiation
 Validation

Question 10.10.Which term refers to the collection of all exposed vulnerabilities? (Points : 1)

 Multilayered exposure
 Exposure to attack
 Vulnerability set
 Attack surface

Question 11.11.Which run mode allows processes to access more restricted parts of a computer system? (Points : 1)

 User
 Supervisor
 Enhanced
 Super

Question 12.12.Which Windows feature prompts users before escalating to administrator privileges? (Points : 1)

 SAT
 DACL
 SID
 UAC

Question 13.13.Which of the following approaches represents the best use of Group Policy? (Points : 1)

 Group Policy works better in Active Directory and GPOs should concentrate on enterprise-
wide settings.
 GPOs provide input to the creation of the organization’s security policy.
 Group Policy is more efficient at the local level and GPOs should concentrate on computer-
specific settings.
 GPOs exist to directly support the organization’s security policy.

Question 14.14.Which Windows command-line utility allows administrators to change access controls settings? (Points : 1)

 attrib
 wbadmin
 appcmd
 icacls

Question 15.15.A security token is which type of authentication? (Points : 1)

 Type I
 Type II
 Type III
 Hybrid

Question 16.16.Which default Windows group provides only limited administrative rights, including the ability to install software? (Points : 1)

 Administrators
 Guests
 Users
 Power Users

Question 17.17.What is the primary motivation for using the defense in depth approach to security? (Points : 1)

 Attackers generally will give up if their initial attack fails.
 No single action, rule, or device can protect a resource from attack.
 Attackers know about too many vulnerabilities to protect against them all.
 Defense in depth helps to hide resources from external access.

Question 18.18.Which of the following control types is the best way to categorize a door with an electronic lock? (Points : 1)

 Technical, preventative
 Technical, corrective
 Physical, preventative
 Physical, detective

Question 19.19.Which of the following well-known attacks used a worm to exploit vulnerabilities in Microsoft Internet Information Services (IIS) starting in July 2001? (Points : 1)

 Stuxnet
 Conficker
 SQL Slammer
 Code Red

Question 20.20.What is the common name of the United States Department of Defense Trusted Computer System Evaluation Criteria? (Points : 1)

 Rainbow Series
 Orange Book
 TCSEC
 Common Criteria

quiz 2

Question 1.1.Microsoft acknowledged the importance of workstation backups by including an enhanced backup utility for workstations in which Windows version? (Points : 1)




Question 2.2.What Microsoft feature provides the ability to encrypt entire volumes? (Points : 1)




Question 3.3.Suppose you are a security administrator who needs to scan multiple Microsoft Windows computers on your network for security vulnerabilities. Which Microsoft tool makes it easy to scan multiple computers? (Points : 1)




Question 4.4.Which type of encryption key does the current version of EFS use? (Points : 1)




Question 5.5.Which element in a PKI infrastructure authorizes a client to request a certificate? (Points : 1)




Question 6.6.What does SCA use to store settings that make up baselines? (Points : 1)




Question 7.7.How often should you scan general computers for malware? (Points : 1)




Question 8.8.Which encryption method is not automatically enabled with the operating system and must be enabled after installation? (Points : 1)




Question 9.9.What is the primary reason for creating backups? (Points : 1)




Question 10.10.Which action is the most important action you can take to stay malware free? (Points : 1)




Question 11.11.Which common vulnerability allows a program to store data outside the memory location set aside for the data? (Points : 1)




Question 12.12.Which entity issues and validates digital certificates? (Points : 1)




Question 13.13.Which method is most commonly used to detect malware? (Points : 1)




Question 14.14.Which type of malware attaches itself to another program? (Points : 1)




Question 15.15.Which Microsoft product supports virtualization at the server level, including using virtual images to create and manage backups? (Points : 1)




Question 16.16.The malware program Animal, released in 1974, was what kind of malware? (Points : 1)




Question 17.17.Which Windows encryption option do you enable using an object’s properties dialog? (Points : 1)




Question 18.18.When enabling BitLocker, what does Windows suggest that you save in a separate location in case you lose the ability to access the primary encryption key? (Points : 1)




Question 19.19.Complete backups copy an entire computer system’s files. What is the main reason why some organizations choose not to always create complete backups? (Points : 1)




Question 20.20.Why would an attacker attempt to boot a computer with a CD using a different operating system? (Points : 1)




Grade Details – All Questions

Question 1. Question : Which of the following controls do not primarily address the Availability tenet of security?

IDS/IPS

Performance monitors

Encryption

Anti-malware protection

Points Received: 0 of 1

Comments:

Question 2. Question : EFS allows security administrators to protect primarily which security tenet?

Availability

Integrity

Confidentiality

Nonrepudiation

Points Received: 1 of 1

Comments:

Question 3. Question : Which Windows Server 2008 R2 installation feature makes the process of building secure servers easier?

Virtual images

Windows Server editions

Windows Server roles

MBSA

Points Received: 1 of 1

Comments:

Question 4. Question : User authentication most commonly protects which two tenets of security?

Integrity and confidentiality

Confidentiality and availability

Integrity and availability

Availability and nonrepudiation

Points Received: 1 of 1

Comments:

Question 5. Question : Which policy would likely define the amount of time a user is locked out after entering the incorrect password 3 times?

Password policy

Account policy

Kerberos policy

Remote access policy

Points Received: 1 of 1

Comments:

Question 6. Question : Which term refers to the ongoing attention and care an organization places on security and compliance?

Regulatory compliance

Due Diligence

Due Care

Governance

Points Received: 1 of 1

Comments:

Question 7. Question : Which type of network cabling is the most common type in use today?

Coaxial

UTP

STP

Fiber optic

Points Received: 0 of 1

Comments:

Question 8. Question : Which is the best control to secure a network service that you only need for internal users?

Disable it

Remove it

Firewall

AppLocker

Points Received: 1 of 1

Comments:

Question 9. Question : What Microsoft Windows Server installation feature makes it easy to install only necessary programs and services?

Server core installation

Windows editions

Window registry

Windows Certificate Services

Points Received: 1 of 1

Comments:

Question 10. Question : Which Microsoft tool helps reduce a server’s attack surface after installing Windows Server 2008 R2?

Security Configuration Wizard

Group Policy Management Console

Registry

Perfmon

Points Received: 1 of 1

Comments:

Question 11. Question : What common network feature hides the true IP addresses of internal computers from outside nodes?

IDS

NAT

DHCP

ICMP

Points Received: 1 of 1

Comments:

Question 12. Question : Which among the following network devices connects two or more separate networks that use the same protocol?

Hub

Switch

Router

Gateway

Points Received: 1 of 1

Comments:

Question 13. Question : Which server application most commonly responds to requests from client applications such as Microsoft Internet Explorer or Mozilla Firefox?

Productivity Software

Application Server

Web Server

Database Server

Points Received: 1 of 1

Comments:

Question 14. Question : Firewalls are security controls used to address which type of security vulnerability?

Traffic flow

Physical access

Device security

Logical access

Points Received: 1 of 1

Comments:

Question 15. Question : Which of the following statements best describes what a firewall does to protect a network?

Filters traffic coming from an outside network to an internal network to exclude suspicious packets

Filters traffic coming from an internal network to an outside network to exclude suspicious packets

Examines traffic coming from an outside network to an internal network to detect suspicious packets

Filters traffic traveling in both directions (internal to external and external to internal) to exclude suspicious packets

Points Received: 1 of 1

Comments:

Question 16. Question : Which Microsoft feature in Windows Server 2008 R2 and Windows 7 (Ultimate and Enterprise) allows administrators to use GPOs to define approved paths from which users can execute programs?

BitLocker

AppLocker

PathProtector

ExecAdmin

Points Received: 0 of 1

Comments:

Question 17. Question : What is the common approach used to separate untrusted networks from trusted networks?

DMZ

Kerberos

Certificates

Encryption

Points Received: 1 of 1

Comments:

Question 18. Question : What is the difference between application software and operating system software?

Operating system software is any software from Microsoft, and application software comes from other vendors.

Operating systems require authentication while application software does not.

Operating system software allows users to interact with hardware, and application software allows users to perform specific tasks.

Operating system software is generally free, and application software generally has a licensing cost.

Points Received: 1 of 1

Comments:

Question 19. Question : What tool allows administrators to manually disable or remove unneeded services or programs?

MBSA

GPOAudit

Registry

SCW

Points Received: 0 of 1

Comments:

Question 20. Question : Which type of application attack involves accessing your application’s data outside the application?

Extra-application data access

Privilege escalation

Direct file access

Spoofing

Points Received: 0 of 1

Comments:

quiz 4

Grade Details – All Questions

Question 1. Question : What is the best response to any security incident?

Student Answer: Contact your local law enforcement agency.

Alert management.

Follow the predefined plan.

Isolate damaged equipment first.

Points Received: 0 of 1

Comments:

Question 2. Question : Why should you never encrypt individual files?

Student Answer: Encrypting files may leave unencrypted versions on disk

Encrypting a file makes it less secure

Encrypting individual files allows attackers to decrypt by comparing files

Encrypting individual files is very slow

Points Received: 0 of 1

Comments:

Question 3. Question : Which term refers to the SDLC’s most important concept that means to break down a software project into phases?

Student Answer: Decomposition

Progressive elaboration

Iterative detailing

Crashing

Points Received: 1 of 1

Comments:

Question 4. Question : Which incident handling step determines the type and possibly the source of an incident?

Student Answer: Containment

Eradication

Recovery

Identification

Points Received: 1 of 1

Comments:

Question 5. Question : When should investigators preserve the chain of custody during an investigation?

Student Answer: When investigating incidents that may result in court proceedings

When investigating incidents that will absolutely result in court proceedings

When investigating all incidents

Only when directed by a law enforcement officer

Points Received: 1 of 1

Comments:

Question 6. Question : Most of the time a CSIRT spends in responding to incidents is spent in which step?

Student Answer: Preparation

Containment

Eradication

Recovery

Points Received: 1 of 1

Comments:

Question 7. Question : Which type of plan protects an organization from critical function interruptions?

Student Answer: DRP

BCP

Recovery plan

Project plan

Points Received: 1 of 1

Comments:

Question 8. Question : What is recommended for implementing secure authentication in Windows?

Student Answer: NTLM

RADIUS

Kerberos

OpenLDAP

Points Received: 1 of 1

Comments:

Question 9. Question : What is the most common location to place a firewall?

Student Answer: Inside the internal network

Outside the internal network

DMZ

WAN

Points Received: 1 of 1

Comments:

Question 10. Question : Which software project scope provides the greatest visibility?

Student Answer: A separate project for each major module in a software application

A single project to develop a complete application

A separate project for each individual program

A single project for a group of related programs

Points Received: 0 of 1

Comments:

Question 11. Question : Many application errors in today’s applications come from problems with database definitions. What are the formal data declarations that database management systems use?

Student Answer: Schemas

Variables

Storage units

Data diagrams

Points Received: 1 of 1

Comments:

Question 12. Question : Why is writing a password down an unsafe practice?

Student Answer: A written password is easier to forget

Users often make mistakes when writing complex passwords

Written passwords are easier for attackers to find

Writing a password down reduces the need to memorize it

Points Received: 1 of 1

Comments:

Question 13. Question : At what point in a software development project should security be included?

Student Answer: At the start of the analysis phase

From the beginning

Code generation

Testing

Points Received: 1 of 1

Comments:

Question 14. Question : Which of the following software tools would an investigator use to acquire evidence from a hard disk

drive?

Student Answer: AIRT

SIFT

RTIR

MBSA

Points Received: 0 of 1

Comments:

Question 15. Question : When does an SDLC phase end?

Student Answer: When the team accepts the deliverables for that phase

At the appointed ending data

When the Configuration Control Board officially closes the phase

When work starts on the subsequent phase

Points Received: 1 of 1

Comments:

Our website has a team of professional writers who can help you write any of your homework. They will write your papers from scratch. We also have a team of editors just to make sure all papers are of HIGH QUALITY & PLAGIARISM FREE. To make an Order you only need to click Ask A Question and we will direct you to our Order Page at WriteDemy. Then fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.

Fill in all the assignment paper details that are required in the order form with the standard information being the page count, deadline, academic level and type of paper. It is advisable to have this information at hand so that you can quickly fill in the necessary information needed in the form for the essay writer to be immediately assigned to your writing project. Make payment for the custom essay order to enable us to assign a suitable writer to your order. Payments are made through Paypal on a secured billing page. Finally, sit back and relax.

Do you need an answer to this or any other questions?

About Writedemy

We are a professional paper writing website. If you have searched a question and bumped into our website just know you are in the right place to get help in your coursework. We offer HIGH QUALITY & PLAGIARISM FREE Papers.

How It Works

To make an Order you only need to click on “Order Now” and we will direct you to our Order Page. Fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.

Are there Discounts?

All new clients are eligible for 20% off in their first Order. Our payment method is safe and secure.

Hire a tutor today CLICK HERE to make your first order