IS3340 CHAPTER 15 Flashcards

1
Q
  1. Anti-malware software applies mainly to workstation computers.
    TRUE OR FALSE
A

FALSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  1. WHAT IS RTO?
  2. Real time objective
  3. Recovery time objective
  4. Recovery turn over
  5. Real turn over
A

Recovery time objective

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
  1. Test your backup only when you suspect media corruption.

TRUE OR FALSE

A

FALSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
  1. Even if you use the same password for a long time, it will remain secure.
    TRUE OR FALSE
A

FALSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
  1. Which of the following is an encryption recovery key that you should physically store in a separate safe location?
  2. DES
  3. AES
  4. SSTP
  5. EFS
A

EFS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  1. Which protocol is the newest VPN protocol from Microsoft?
  2. SSTP
  3. L2TP
  4. PPP
  5. TLS
A

SSTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
  1. The Plan, Do, Check, Act (PDCA) process is also called a ___ cycle.
A

Deming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  1. Which printer actions should you audit?
  2. Remote access
  3. Print non-text files
  4. Change printer destination
  5. All the above
A

Remote access
Print non-text files
Change printer destination

All the above

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
  1. Which of the following tools will compare computer settings to your standards? (Select two)
  2. GPMC
  3. SCA
  4. MBSA
  5. PDCA
A

SCA

MBSA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
  1. Change your ____ Directory Service Restore Mode (DSRM) password periodically, at least every six months.
A

Active Directory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
  1. What program should you run on Windows Server 2008 R2 immediately after installing the operating system?
  2. Group Policy Object (GPO)
  3. Anti-malware Shiel
  4. Security Configuration Wizard (SCW)
  5. Network Access Control (NAC)
A

Security Configuration Wizard (SCW)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
  1. What is the first step to take when hardening applications?
  2. Remove or disable unneeded services
  3. Define unique user accounts
  4. Harden the operating system
  5. Ensure every computer has up-to-date anti-malware and data
A

Harden the operating system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
  1. To isolate Web server computers from your internal network, place them in a segregated network called a ___.
A

Demilitarized Zone (DMZ)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
  1. Which of the following is the best choice for secure wireless communications?
  2. WPA
  3. WEP
  4. SSID
  5. TLS
A

WPA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
  1. Which of the following is NOT a core concept of Secure Development Lifecycle (SDL)?
  2. Education
  3. Availability
  4. Continuous improvement
  5. Accountability
A

Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The practice of renting computer resources from a provider instead of owning the resources is called ___?

A

CLOUD COMPUTING

17
Q

The process of an attacker tricking or convincing an authorized user to carry out an action or provide valuable information for which the attacker is unauthorized is called ___?

A

SOCIAL ENGINEERING