Grade Details – All Questions
Question 1.
Question :
Which of the following controls do not primarily address the Availability tenet of security?
Question 2.
Question :
EFS allows security administrators to protect primarily which security tenet?
Question 3.
Question :
Which Windows Server 2008 R2 installation feature makes the process of building secure servers easier?
Question 4.
Question :
User authentication most commonly protects which two tenets of security?
Question 5.
Question :
Which policy would likely define the amount of time a user is locked out after entering the incorrect password 3 times?
Question 6.
Question :
Which term refers to the ongoing attention and care an organization places on security and compliance?
Question 7.
Question :
Which type of network cabling is the most common type in use today?
Question 8.
Question :
Which is the best control to secure a network service that you only need for internal users?
Question 9.
Question :
What Microsoft Windows Server installation feature makes it easy to install only necessary programs and services?
Question 10.
Question :
Which Microsoft tool helps reduce a servers attack surface after installing Windows Server 2008 R2?
Question 11.
Question :
What common network feature hides the true IP addresses of internal computers from outside nodes?
Question 12.
Question :
Which among the following network devices connects two or more separate networks that use the same protocol?
Question 13.
Question :
Which server application most commonly responds to requests from client applications such as Microsoft Internet Explorer or Mozilla Firefox?
Question 14.
Question :
Firewalls are security controls used to address which type of security vulnerability?
Question 15.
Question :
Which of the following statements best describes what a firewall does to protect a network?
Question 16.
Question :
Which Microsoft feature in Windows Server 2008 R2 and Windows 7 (Ultimate and Enterprise) allows administrators to use GPOs to define approved paths from which users can execute programs?
Question 17.
Question :
What is the common approach used to separate untrusted networks from trusted networks?
Question 18.
Question :
What is the difference between application software and operating system software?
Question 19.
Question :
What tool allows administrators to manually disable or remove unneeded services or programs?
Question 20.
Question :
Which type of application attack involves accessing your applications data outside the application?