CHAPTER 10 ASSESSMENT

  1.   1. Security administration is the process of developing an organization’s security policy.

    1. True

    2. False

  2.   2. What is the most important feature of PDCA?

    1. PDCA was developed for security administration.

    2. PDCA is a Microsoft standard.

    3. PDCA repeats and does not end.

    4. PDCA was developed by Dr. Deming.

  3.   3. Which of the following activities would a security administrator be least likely to do?

    1. Monitor log files.

    2. Deliver AUP training.

    3. Keep software up to date.

    4. Enforce physical security controls.

  4.   4. If time to recover exceeds the recovery goal, which property of security have you violated?

    1. Availability

    2. Integrity

    3. Confidentiality

    4. Consistency

  5.   5. Which of the following devices or software programs can detect intrusions? (Select two.)

    1. Firewall

    2. IDS

    3. IPS

    4. NAT

  6.   6. A valid backup is an integral part of your ________ and ________.

  7.   7. Protecting both integrity and confidentiality depends largely on knowing a user’s identity.

    1. True

    2. False

  8.   8. A DACL is used primarily to enforce which security properties? (Select two.)

    1. Integrity

    2. Consistency

    3. Confidentiality

    4. Availability

  9.   9. You can use the ________ tool to ensure your Microsoft operating system is up to date and has all patches and service packs installed.

  10.   10. Active Directory requires that you create multiple GPOs, one for each computer.

    1. True

    2. False

  11.   11. Which of the following terms is best described as a collection of requirements users must meet, typically within a specific system or environment?

    1. Security policy

    2. Security standard

    3. Security procedure

    4. Security guideline

  12.   12. Which type of Windows component would you use to define which users can create files in a folder?

    1. DACL

    2. NAT

    3. User right

    4. IPSec rule

  13.   13. Which tool would you use to edit the setting that disables user-installed desktop gadgets for all users?

    1. Local Group Policy Editor

    2. MBSA

    3. GPMC

    4. Performance Monitor

  14.   14. Microsoft provides a command-line utility for creating backups on Windows server and workstation OSs.

    1. True

    2. False

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.141.30.210