Tuesday, December 29, 2015

IS3340 Final Exam (ITT Tech)


IS3340 Final Exam (ITT Tech)
Which core part of an operating system provides essential services?
Which among the following is the process of proving that provided identity credentials are valid and correct?
The ability to run a backup is an example of which Windows feature?
Which among the following is the best reason to define security groups while configuring access rights for users in a network?
Which of the following is the best reason to use Active Directory?
Which of the following statements best describes the principle of least privilege?
In which process would a user be asked to enter a token-generated password?
Which structure does Windows use to store access control rules for objects?
Which Microsoft feature enables administrators to define access controls in a centralized location?
Which Windows command-line utility allows administrators to change access controls settings?
Which Windows encryption option can use the computer’s trusted platform module (TPM) chip to store encryption keys?
Which Windows encryption option do you enable using an object’s properties dialog?
Which of the following protocols encrypts data?
Which element in a PKI infrastructure authorizes a client to request a certificate?
Which entity issues and validates digital certificates?
Which type of malware is a self-contained program?
Which antivirus software feature protects computers from infected e-mail messages as they are downloaded?
How often should anti-malware generally check for updates?
How often should you scan general computers for malware?
Which action is the most important action you can take to stay malware free?
Where do Windows store most of the local GPO settings?
Which type of container should you link to a GPO to apply the GPO to a logical group of sites?
Which tool shows the effect applying GPOs will have for a specific user on a specific computer?
Which of the following products is not scanned by MBSA?
Which vulnerability scanner extends MBSA and allows you to view scan results using MBSA?
Which workstation backup option provides separation, performance, and convenience?
Which Microsoft Windows backup utility is the best choice for running backups without using a GUI, such as when using scheduled scripts to back up Windows 7 computers?
Which Windows backup and restore options creates a workstation backup on demand?
If you accidently deleted 47 files from your documents folder, which type of restore operation would be best—assuming you have been making many changes to several documents?
Which Microsoft product supports virtualization at the server level, including using virtual images to create and manage backups?
Which among the following network devices forwards inputs it receives only to the appropriate output port?
Which is the best control to secure a network service that you only need for internal users?
What is the first step to ensure a necessary network service is secure?
Which Microsoft utility helps secure Windows server computers by applying standard settings?
What is the first step in enforcing end-user compliance with your security policy?
Which of the following attacks add more authority to the current session of an application than the process should possess?
Which of the following steps of hardening client application software ensures that the software has the fewest number of known vulnerabilities?
Which server application most commonly responds to requests from client applications such as Microsoft Internet Explorer or Mozilla Firefox?
Which security control best protects private information when using a public network?
Which technique helps ensure data exchanged between a client and a database server is secure in a distributed environment?
Which incident handling step returns affected systems to an operational state?
Which of the following software tools would an investigator use to acquire evidence from a hard disk drive?
Which type of evidence describes the contents of a data file?
What is the most important rule when collecting evidence to ensure it is admissible in court?
What is documentation that provides the details of every move and access of evidence called?
According to the Microsoft SDL, which phase is necessary before all others to ensure software that is developed is secure?
Which common regulatory requirement ensures that software developers do not change programs currently running in a production environment?
Which Microsoft tool makes it easy to assess a computer to find common security vulnerabilities?
What is the common approach used to separate untrusted networks from trusted networks?

What is the best defense from social engineering attacks?

No comments:

Post a Comment