Test 1 - Windows Security

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Which of the following exists to provide functionality to end users?

Client

Which of the following refers to the assurance that information can be modified only by authorized users?

Integrity

Geraldo is an incident response team member. A suspected attack occurred. Geraldo has been monitoring logs for abnormal activity. What is the next step of the Discovery-Analysis-Remediation?

Analyze

Which of the following is the Windows Server 2019 edition designed for large-scale deployment on servers that support extensive virtualization?

Datacenter

Which of the following is defined as a collection of strategies intended to make a computer environment safe?

Defense in depth

Which of the following is defined as any action that dramatically slows down or blocks access to one or more resources?

Denial of service (DoS) attack

Which control discovers an action that has occurred?

Detective control

Which of the following refers to technical controls?

Devices or processes that limit access to resources

What is an example of a physical control?

Fire extinguisher

Your computer network has been successfully attacked. What should you accomplish during the remediation phase of the discovery-analysis-remediation cycle?

Implement controls to prevent a successful attack.

Which of the following describes a family of attacks that depend on the ability to send instructions to a software application that cause the application to carry out unintended actions?

Injection

Alice works in the corporate legal office. She is reviewing sections of the Microsoft End-User License Agreement (EULA). She is specifically looking to answer what costs can be recovered as a result of a Windows fault or incident. What section answers Alice's concerns?

Limited Warranty

Dafne is an IT manager. She needs to acquire 10 new workstation computers for employee use. She wants the workstations to have the latest client operating system. Which of the following should she select?

Microsoft Windows 10

Which type of attack generally starts with a message that contains a link or image to click, or a file to open?

Phishing

Locky and WannaCry are types of ________.

Ransomware

What term is defined as any exposure to a threat?

Risk

Which of the following best describes confidentiality, availability, and integrity (the C-I-A triad)?

Tenets of information security

Erwin is the security analyst for a small company. His logs reveal evidence that a session hijacking attack likely occurred. What assumptions might Erwin make as a result of this attack?

Users' credentials might be compromised

A successful attack is defined as one that realizes, or carries out, a threat against ________.

Vulnerabilities

Bob is a security analyst scanning for vulnerabilities on a Windows print server. He discovers the print server is vulnerable to the exploit EternalBlue. Which of the following is Bob concerned could exploit this print server?

WannaCry


संबंधित स्टडी सेट्स

Chapter 9 - Substance Related and Addictive Disorders

View Set

محيط الاشكال الهندسية

View Set