IS3340 CHAPTER 15 Flashcards Preview

IS3340 SEC. STRAT. IN WINDOWS PLATFORM & APPS. > IS3340 CHAPTER 15 > Flashcards

Flashcards in IS3340 CHAPTER 15 Deck (17):
1

1. Anti-malware software applies mainly to workstation computers.
TRUE OR FALSE

FALSE

2

2. WHAT IS RTO?

1. Real time objective
2. Recovery time objective
3. Recovery turn over
4. Real turn over

Recovery time objective

3

3. Test your backup only when you suspect media corruption.
TRUE OR FALSE

FALSE

4

4. Even if you use the same password for a long time, it will remain secure.
TRUE OR FALSE

FALSE

5

5. Which of the following is an encryption recovery key that you should physically store in a separate safe location?

1. DES
2. AES
3. SSTP
4. EFS

EFS

6

6. Which protocol is the newest VPN protocol from Microsoft?

1. SSTP
2. L2TP
3. PPP
4. TLS

SSTP

7

7. The Plan, Do, Check, Act (PDCA) process is also called a ___ cycle.

Deming

8

8. Which printer actions should you audit?

1. Remote access
2. Print non-text files
3. Change printer destination
4. All the above

Remote access
Print non-text files
Change printer destination

All the above

9

9. Which of the following tools will compare computer settings to your standards? (Select two)

1. GPMC
2. SCA
3. MBSA
4. PDCA

SCA

MBSA

10

10. Change your ____ Directory Service Restore Mode (DSRM) password periodically, at least every six months.

Active Directory

11

11. What program should you run on Windows Server 2008 R2 immediately after installing the operating system?
1. Group Policy Object (GPO)
2. Anti-malware Shiel
3. Security Configuration Wizard (SCW)
4. Network Access Control (NAC)

Security Configuration Wizard (SCW)

12

12. What is the first step to take when hardening applications?

1. Remove or disable unneeded services
2. Define unique user accounts
3. Harden the operating system
4. Ensure every computer has up-to-date anti-malware and data

Harden the operating system

13

13. To isolate Web server computers from your internal network, place them in a segregated network called a ___.

Demilitarized Zone (DMZ)

14

14. Which of the following is the best choice for secure wireless communications?

1. WPA
2. WEP
3. SSID
4. TLS

WPA

15

15. Which of the following is NOT a core concept of Secure Development Lifecycle (SDL)?

1. Education
2. Availability
3. Continuous improvement
4. Accountability

Availability

16

The practice of renting computer resources from a provider instead of owning the resources is called ___?

CLOUD COMPUTING

17

The process of an attacker tricking or convincing an authorized user to carry out an action or provide valuable information for which the attacker is unauthorized is called ___?

SOCIAL ENGINEERING