Chat with us, powered by LiveChat Saint COm520 week 6 quiz 3 | Writedemy

Saint COm520 week 6 quiz 3

Saint COm520 week 6 quiz 3

Question

Grade Details – All Questions

Question 1. Question : Which of the following controls do not primarily address the Availability tenet of security?

IDS/IPS

Performance monitors

Encryption

Anti-malware protection

Points Received: 0 of 1

Comments:

Question 2. Question : EFS allows security administrators to protect primarily which security tenet?

Availability

Integrity

Confidentiality

Nonrepudiation

Points Received: 1 of 1

Comments:

Question 3. Question : Which Windows Server 2008 R2 installation feature makes the process of building secure servers easier?

Virtual images

Windows Server editions

Windows Server roles

MBSA

Points Received: 1 of 1

Comments:

Question 4. Question : User authentication most commonly protects which two tenets of security?

Integrity and confidentiality

Confidentiality and availability

Integrity and availability

Availability and nonrepudiation

Points Received: 1 of 1

Comments:

Question 5. Question : Which policy would likely define the amount of time a user is locked out after entering the incorrect password 3 times?

Password policy

Account policy

Kerberos policy

Remote access policy

Points Received: 1 of 1

Comments:

Question 6. Question : Which term refers to the ongoing attention and care an organization places on security and compliance?

Regulatory compliance

Due Diligence

Due Care

Governance

Points Received: 1 of 1

Comments:

Question 7. Question : Which type of network cabling is the most common type in use today?

Coaxial

UTP

STP

Fiber optic

Points Received: 0 of 1

Comments:

Question 8. Question : Which is the best control to secure a network service that you only need for internal users?

Disable it

Remove it

Firewall

AppLocker

Points Received: 1 of 1

Comments:

Question 9. Question : What Microsoft Windows Server installation feature makes it easy to install only necessary programs and services?

Server core installation

Windows editions

Window registry

Windows Certificate Services

Points Received: 1 of 1

Comments:

Question 10. Question : Which Microsoft tool helps reduce a server’s attack surface after installing Windows Server 2008 R2?

Security Configuration Wizard

Group Policy Management Console

Registry

Perfmon

Points Received: 1 of 1

Comments:

Question 11. Question : What common network feature hides the true IP addresses of internal computers from outside nodes?

IDS

NAT

DHCP

ICMP

Points Received: 1 of 1

Comments:

Question 12. Question : Which among the following network devices connects two or more separate networks that use the same protocol?

Hub

Switch

Router

Gateway

Points Received: 1 of 1

Comments:

Question 13. Question : Which server application most commonly responds to requests from client applications such as Microsoft Internet Explorer or Mozilla Firefox?

Productivity Software

Application Server

Web Server

Database Server

Points Received: 1 of 1

Comments:

Question 14. Question : Firewalls are security controls used to address which type of security vulnerability?

Traffic flow

Physical access

Device security

Logical access

Points Received: 1 of 1

Comments:

Question 15. Question : Which of the following statements best describes what a firewall does to protect a network?

Filters traffic coming from an outside network to an internal network to exclude suspicious packets

Filters traffic coming from an internal network to an outside network to exclude suspicious packets

Examines traffic coming from an outside network to an internal network to detect suspicious packets

Filters traffic traveling in both directions (internal to external and external to internal) to exclude suspicious packets

Points Received: 1 of 1

Comments:

Question 16. Question : Which Microsoft feature in Windows Server 2008 R2 and Windows 7 (Ultimate and Enterprise) allows administrators to use GPOs to define approved paths from which users can execute programs?

BitLocker

AppLocker

PathProtector

ExecAdmin

Points Received: 0 of 1

Comments:

Question 17. Question : What is the common approach used to separate untrusted networks from trusted networks?

DMZ

Kerberos

Certificates

Encryption

Points Received: 1 of 1

Comments:

Question 18. Question : What is the difference between application software and operating system software?

Operating system software is any software from Microsoft, and application software comes from other vendors.

Operating systems require authentication while application software does not.

Operating system software allows users to interact with hardware, and application software allows users to perform specific tasks.

Operating system software is generally free, and application software generally has a licensing cost.

Points Received: 1 of 1

Comments:

Question 19. Question : What tool allows administrators to manually disable or remove unneeded services or programs?

MBSA

GPOAudit

Registry

SCW

Points Received: 0 of 1

Comments:

Question 20. Question : Which type of application attack involves accessing your application’s data outside the application?

Extra-application data access

Privilege escalation

Direct file access

Spoofing

Points Received: 0 of 1

Comments:

Our website has a team of professional writers who can help you write any of your homework. They will write your papers from scratch. We also have a team of editors just to make sure all papers are of HIGH QUALITY & PLAGIARISM FREE. To make an Order you only need to click Ask A Question and we will direct you to our Order Page at WriteDemy. Then fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.

Fill in all the assignment paper details that are required in the order form with the standard information being the page count, deadline, academic level and type of paper. It is advisable to have this information at hand so that you can quickly fill in the necessary information needed in the form for the essay writer to be immediately assigned to your writing project. Make payment for the custom essay order to enable us to assign a suitable writer to your order. Payments are made through Paypal on a secured billing page. Finally, sit back and relax.

Do you need an answer to this or any other questions?

About Writedemy

We are a professional paper writing website. If you have searched a question and bumped into our website just know you are in the right place to get help in your coursework. We offer HIGH QUALITY & PLAGIARISM FREE Papers.

How It Works

To make an Order you only need to click on “Order Now” and we will direct you to our Order Page. Fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.

Are there Discounts?

All new clients are eligible for 20% off in their first Order. Our payment method is safe and secure.

Hire a tutor today CLICK HERE to make your first order