Chat with us, powered by LiveChat Saint COm520 week 2 quiz 1 -100% correct | Writedemy

Saint COm520 week 2 quiz 1 -100% correct

Saint COm520 week 2 quiz 1 -100% correct

Question
Question 1.1.What is the primary benefit of using kernel loadable modules? (Points : 1)

 Easier to secure
 Uses less disk space
 Reduces the kernel’s memory footprint
 Allows more security controls

Question 2.2.Which of the following best defines an ACL? (Points : 1)

 Collection of authentication credentials
 List of user rights
 Collection of previous passwords
 List of access permissions

Question 3.3.Which Windows kernel mode component provides the actual access to physical hardware? (Points : 1)

 HAL
 Executive
 Kernel mode drivers
 Microkernel

Question 4.4.Which term refers to a countermeasure that defines how users should create passwords? (Points : 1)

 Detective security control
 Physical security control
 Administrative security control
 Corrective security control

Question 5.5.Which GPO feature allows you to apply a GPO to a defined set of users? (Points : 1)

 Policy constraint
 Domain scope
 GPO query
 Security filter

Question 6.6.Who holds the ultimate responsibility for the security of an organization’s IT assets? (Points : 1)

 Users
 IT operations personnel
 IT security personnel
 Management

Question 7.7.The Windows Group Policy feature provides the ability to define and apply which type(s) of settings to one or more computers? (Points : 1)

 Application configuration only
 Security configuration only
 General configuration only
 General and security configurations

Question 8.8.In which token does Windows store all the security identifiers (SIDs) for a process? (Points : 1)

 SID list
 SAT
 BSS
 UAC

Question 9.9.In which process would a user be asked to enter a token-generated password? (Points : 1)

 Authentication
 Authorization
 Nonrepudiation
 Validation

Question 10.10.Which term refers to the collection of all exposed vulnerabilities? (Points : 1)

 Multilayered exposure
 Exposure to attack
 Vulnerability set
 Attack surface

Question 11.11.Which run mode allows processes to access more restricted parts of a computer system? (Points : 1)

 User
 Supervisor
 Enhanced
 Super

Question 12.12.Which Windows feature prompts users before escalating to administrator privileges? (Points : 1)

 SAT
 DACL
 SID
 UAC

Question 13.13.Which of the following approaches represents the best use of Group Policy? (Points : 1)

 Group Policy works better in Active Directory and GPOs should concentrate on enterprise-
wide settings.
 GPOs provide input to the creation of the organization’s security policy.
 Group Policy is more efficient at the local level and GPOs should concentrate on computer-
specific settings.
 GPOs exist to directly support the organization’s security policy.

Question 14.14.Which Windows command-line utility allows administrators to change access controls settings? (Points : 1)

 attrib
 wbadmin
 appcmd
 icacls

Question 15.15.A security token is which type of authentication? (Points : 1)

 Type I
 Type II
 Type III
 Hybrid

Question 16.16.Which default Windows group provides only limited administrative rights, including the ability to install software? (Points : 1)

 Administrators
 Guests
 Users
 Power Users

Question 17.17.What is the primary motivation for using the defense in depth approach to security? (Points : 1)

 Attackers generally will give up if their initial attack fails.
 No single action, rule, or device can protect a resource from attack.
 Attackers know about too many vulnerabilities to protect against them all.
 Defense in depth helps to hide resources from external access.

Question 18.18.Which of the following control types is the best way to categorize a door with an electronic lock? (Points : 1)

 Technical, preventative
 Technical, corrective
 Physical, preventative
 Physical, detective

Question 19.19.Which of the following well-known attacks used a worm to exploit vulnerabilities in Microsoft Internet Information Services (IIS) starting in July 2001? (Points : 1)

 Stuxnet
 Conficker
 SQL Slammer
 Code Red

Question 20.20.What is the common name of the United States Department of Defense Trusted Computer System Evaluation Criteria? (Points : 1)

 Rainbow Series
 Orange Book
 TCSEC
 Common Criteria

Our website has a team of professional writers who can help you write any of your homework. They will write your papers from scratch. We also have a team of editors just to make sure all papers are of HIGH QUALITY & PLAGIARISM FREE. To make an Order you only need to click Ask A Question and we will direct you to our Order Page at WriteDemy. Then fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.

Fill in all the assignment paper details that are required in the order form with the standard information being the page count, deadline, academic level and type of paper. It is advisable to have this information at hand so that you can quickly fill in the necessary information needed in the form for the essay writer to be immediately assigned to your writing project. Make payment for the custom essay order to enable us to assign a suitable writer to your order. Payments are made through Paypal on a secured billing page. Finally, sit back and relax.

Do you need an answer to this or any other questions?

About Writedemy

We are a professional paper writing website. If you have searched a question and bumped into our website just know you are in the right place to get help in your coursework. We offer HIGH QUALITY & PLAGIARISM FREE Papers.

How It Works

To make an Order you only need to click on “Order Now” and we will direct you to our Order Page. Fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.

Are there Discounts?

All new clients are eligible for 20% off in their first Order. Our payment method is safe and secure.

Hire a tutor today CLICK HERE to make your first order