saint com520 quiz 3

Grade Details – All Questions

Question 1.

Question :

Which of the following controls do not primarily address the Availability tenet of security?

Question 2.

Question :

EFS allows security administrators to protect primarily which security tenet?

Question 3.

Question :

Which Windows Server 2008 R2 installation feature makes the process of building secure servers easier?

Question 4.

Question :

User authentication most commonly protects which two tenets of security?

Question 5.

Question :

Which policy would likely define the amount of time a user is locked out after entering the incorrect password 3 times?

Question 6.

Question :

Which term refers to the ongoing attention and care an organization places on security and compliance?

Question 7.

Question :

Which type of network cabling is the most common type in use today?

Question 8.

Question :

Which is the best control to secure a network service that you only need for internal users?

Question 9.

Question :

What Microsoft Windows Server installation feature makes it easy to install only necessary programs and services?

Question 10.

Question :

Which Microsoft tool helps reduce a server’s attack surface after installing Windows Server 2008 R2?

Question 11.

Question :

What common network feature hides the true IP addresses of internal computers from outside nodes?

Question 12.

Question :

Which among the following network devices connects two or more separate networks that use the same protocol?

Question 13.

Question :

Which server application most commonly responds to requests from client applications such as Microsoft Internet Explorer or Mozilla Firefox?

Question 14.

Question :

Firewalls are security controls used to address which type of security vulnerability?

Question 15.

Question :

Which of the following statements best describes what a firewall does to protect a network?

Question 16.

Question :

Which Microsoft feature in Windows Server 2008 R2 and Windows 7 (Ultimate and Enterprise) allows administrators to use GPOs to define approved paths from which users can execute programs?

Question 17.

Question :

What is the common approach used to separate untrusted networks from trusted networks?

Question 18.

Question :

What is the difference between application software and operating system software?

Question 19.

Question :

What tool allows administrators to manually disable or remove unneeded services or programs?

Question 20.

Question :

Which type of application attack involves accessing your application’s data outside the application?