1. Security administration is the process of developing an organization’s security policy.
True
False
2. What is the most important feature of PDCA?
PDCA was developed for security administration.
PDCA is a Microsoft standard.
PDCA repeats and does not end.
PDCA was developed by Dr. Deming.
3. Which of the following activities would a security administrator be least likely to do?
Monitor log files.
Deliver AUP training.
Keep software up to date.
Enforce physical security controls.
4. If time to recover exceeds the recovery goal, which property of security have you violated?
Availability
Integrity
Confidentiality
Consistency
5. Which of the following devices or software programs can detect intrusions? (Select two.)
Firewall
IDS
IPS
NAT
6. A valid backup is an integral part of your ________ and ________.
7. Protecting both integrity and confidentiality depends largely on knowing a user’s identity.
True
False
8. A DACL is used primarily to enforce which security properties? (Select two.)
Integrity
Consistency
Confidentiality
Availability
9. You can use the ________ tool to ensure your Microsoft operating system is up to date and has all patches and service packs installed.
10. Active Directory requires that you create multiple GPOs, one for each computer.
True
False
11. Which of the following terms is best described as a collection of requirements users must meet, typically within a specific system or environment?
Security policy
Security standard
Security procedure
Security guideline
12. Which type of Windows component would you use to define which users can create files in a folder?
DACL
NAT
User right
IPSec rule
13. Which tool would you use to edit the setting that disables user-installed desktop gadgets for all users?
Local Group Policy Editor
MBSA
GPMC
Performance Monitor
14. Microsoft provides a command-line utility for creating backups on Windows server and workstation OSs.
True
False
3.141.30.210