CHAPTER 15 ASSESSMENT

  1.   1. Anti-malware software applies mainly to workstation computers.

    1. True

    2. False

  2.   2. What is RTO?

    1. Real-time objective

    2. Recovery time objective

    3. Recovery turn over

    4. Real turn over

  3.   3. Test your backup only when you suspect media corruption.

    1. True

    2. False

  4.   4. Even if you use the same password for a long time, it will remain secure.

    1. True

    2. False

  5.   5. Which of the following is an encryption recovery key that you should physically store in a separate safe location?

    1. DES

    2. AES

    3. SSTP

    4. EFS

  6.   6. Which protocol is the newest VPN protocol from Microsoft?

    1. IKEv2

    2. L2TP

    3. SSTP

    4. TLS

  7.   7. The Plan, Do, Check, Act (PDCA) process is also called a ________ cycle.

  8.   8. Which printer actions should you audit?

    1. Remote access

    2. Print nontext files

    3. Change printer destination

    4. All actions

  9.   9. Which of the following tools will compare computer settings with your standards? (Select two.)

    1. GPMC

    2. SCA

    3. MBSA

    4. PDCA

  10. 10. Change your ________ Directory Service Restore Mode (DSRM) password periodically, at least every 6 months.

  11. 11. What program should you run on Windows Server immediately after installing the operating system?

    1. Group Policy Object (GPO)

    2. Anti-malware shield

    3. Security Configuration Wizard (SCW)

    4. Network access control (NAC)

  12. 12. What is the first step to take when hardening applications?

    1. Remove or disable unneeded services.

    2. Define unique user accounts.

    3. Harden the operating system.

    4. Ensure every computer has up-to-date anti-malware software and data.

  13. 13. To isolate web server computers from your internal network, place them in a segregated network called a ________.

  14. 14. Which of the following is the best choice for secure wireless communications?

    1. WPA

    2. WEP

    3. SSID

    4. TLS

  15. 15. Which of the following is not a core concept of Security Development Lifecycle (SDL)?

    1. Education

    2. Availability

    3. Continuous improvement

    4. Accountability

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.133.133.61