1. Anti-malware software applies mainly to workstation computers.
True
False
2. What is RTO?
Real-time objective
Recovery time objective
Recovery turn over
Real turn over
3. Test your backup only when you suspect media corruption.
True
False
4. Even if you use the same password for a long time, it will remain secure.
True
False
5. Which of the following is an encryption recovery key that you should physically store in a separate safe location?
DES
AES
SSTP
EFS
6. Which protocol is the newest VPN protocol from Microsoft?
IKEv2
L2TP
SSTP
TLS
7. The Plan, Do, Check, Act (PDCA) process is also called a ________ cycle.
8. Which printer actions should you audit?
Remote access
Print nontext files
Change printer destination
All actions
9. Which of the following tools will compare computer settings with your standards? (Select two.)
GPMC
SCA
MBSA
PDCA
10. Change your ________ Directory Service Restore Mode (DSRM) password periodically, at least every 6 months.
11. What program should you run on Windows Server immediately after installing the operating system?
Group Policy Object (GPO)
Anti-malware shield
Security Configuration Wizard (SCW)
Network access control (NAC)
12. What is the first step to take when hardening applications?
Remove or disable unneeded services.
Define unique user accounts.
Harden the operating system.
Ensure every computer has up-to-date anti-malware software and data.
13. To isolate web server computers from your internal network, place them in a segregated network called a ________.
14. Which of the following is the best choice for secure wireless communications?
WPA
WEP
SSID
TLS
15. Which of the following is not a core concept of Security Development Lifecycle (SDL)?
Education
Availability
Continuous improvement
Accountability
3.142.250.203