IS3340 CHAPTER 7 Flashcards
A evaluation of a collection of one or more objects is called an ___?
AUDIT
A collection of configuration settings often collected and saved for the purposes of comparing to other similar collections of configuration settings is called ___?
A structured collection, or collection of specific item versions.
BASELINE
An easy-to-use tool that evaluates the current security state of computers in accordance with Microsoft security recommendations is called __?
MICROSOFT BASELINE SECURITY ANALYZER (MBSA)
A graphical user interface framework that provides a centralized method to manage software components on Windows computers and is called ___?
MICROSOFT MANAGEMENT CONSOLE (MMC)
A security scanner from Shavlik that scans and analyzes the patch status of product MBSA does not support is called ___?
This also has a Limited version.
NETCHK PROTECT
A consumer-based vulnerability scanner from Secunia that searches for vulnerable or out-of-date programs and plug-ins is called ___?
This runs in a Web browser and does not need to be installed on the computer it is scanning.
ONLINE SOFTWARE INSPECTOR (OSI)
The process of comparing real computer configurations with known baselines for the purpose of documenting the pertinent differences with secure settings and similarities to insecure settings is called ___?
PROFILING
A tool that helps administrators to analyze a computer and compare its configuration settings against a baseline is called ___?
SECURITY CONFIGURATION AND ANALYSIS (SCA)
A text file that contains a list of configuration settings is called ___?
SECURITY TEMPLATE
An administrative program designed to run in the MMC is called ___?
SNAP-IN
- A baseline is the initial settings in a newly installed system.
TRUE OR FALSE
FALSE
- A baseline, also called a ___, is a collection of settings at a specific point in time.
Snapshot
- Which Microsoft tool analyzes a computer’s settings and compares its configuration to a baseline?
- SCA
- MBSA
- NetChk
- OSI
SCA
- Stored settings that comprise a baseline are stored in which type of files?
- Baseline configuration
- Baseline database
- Security template
- Security object
Security template
- The Security Configuration and Analysis tool operates as a snap-in to the ___?
MMC
- Which command line tool provides the same scanning capability as SCA?
- secedit
- mbsacli
- scacli
- mbsaedit
secedit
- Which of the following products does MBSA NOT analyze?
- IIS
- SQL Server
- Adobe Acrobat
- Windows 7
Adobe Acrobat
- MBSA automatically ranks vulnerabilities by severity.
TRUE OR FALSE
TRUE
- Which command line tool provides the same scanning capability as MBSA?
- secedit
- mbsacli
- scacli
- mbsaedit
.
- Which security scanner looks for weak passwords?
- SCA
- OSI
- NetChk Protect
- MBSA
MBSA
- What does NetChk Protect Limited do that MBSA does not do?
- Scans the latest Microsoft products
- Scans legacy Microsoft products
- Scans all Microsoft products
- Scans selected Microsoft products
Scans legacy Microsoft products
- Which security scanner runs in a Web browser and doesn’t require that you install a product before scanning?
- NetChk Protect Limited
- MBSA
- OSI
- PSI
OSI
- Which of the following statements best describe the relationship between profiling and auditing?
- Auditing is often a part of profiling
- Profiling is often a part of auditing
- Profiling and auditing are interchangeable terms
- If auditing is in place profiling is not necessary
Profiling is often a part of auditing
- When designing an audit strategy, you should log access attempts on the ___ number of objects.
Minimum
- What is the main purpose of an audit?
- Uncover problems
- Catch errors
- Validate compliance
- Standardize configurations
Validate compliance