CHAPTER 8 Microsoft Windows Backup and Recovery Tools
1. B
2. A and C
3. C
4. Increases
5. Decreases
6. B
7. A
8. B
9. A
10. B
11. D
12. B
13. Bare metal recovery
14. B
CHAPTER 9 Microsoft Windows Network Security
1. Metropolitan area network (MAN)
2. B
3. C
4. Coaxial
5. A
6. A
7. Demilitarized zone (DMZ)
8. B
9. D
10. C
11. A
12. A
13. B and C
14. B
15. C
CHAPTER 10 Microsoft Windows Security Administration
1. B
2. C
3. B
4. A
5. B and C
6. Business continuity plan (BCP) and disaster recovery plan (DRP)
7. A
8. A and C
9. MBDA
10. B
11. B
12. A
13. C
14. A
CHAPTER 13 Microsoft Windows Incident Handling and Management
1. B
2. A
3. B
4. Preparation
5. C
6. Lessons learned
7. B
8. C
9. B
10. A
11. C
12. B
13. Chain of custody log
14. A
15. A
CHAPTER 14 Microsoft Windows and the Security Life Cycle
1. A
2. C
3. B
4. B
5. Training
6. C
7. Building Security in Maturity Model (BSIMM)
8. D
9. Validation
10. Schema
11. B
12. Configuration Control Board (CCB)
13. D
CHAPTER 15 Best Practices for Microsoft Windows and Application Security
1. B
2. B
3. B
4. B
5. D
6. A
7. Deming
8. D
9. B and C
10. Active Directory
11. C
12. C
13. Demilitarized zone (DMZ)
14. A
15. B
..................Content has been hidden....................
You can't read the all page of ebook, please click
here login for view all page.