CSS COC3 SET. A

Cards (30)

  • What Performance Monitor allows viewing of information that previously saved to a log file?
    View Log File Data
  • A service role in organization that manage to validate identification of entities such as websites, email and network communication needs to be encrypted?
    Certification Authority
  • What Application group that contains a Client Access Point and with at least one application specific resource?
    Virtual cluster server
  • _____ is a lightweight command that used in the PowerShell environment.
    Cmdlet
  • What services in Windows Server that enables administrators to migrate data to a lower-cost and tape media on file servers?
    Remote Storage Service
  • What Security Risk Assessments that used to respond to network change requests and network architectural design proposals?
    Network connectivity
  • What utility of Microsoft website that allows Windows users to update Operating Systems by downloading updated files (critical and noncritical software updates)?
    Windows Update
  • What type of backup that makes a copy of data that has changed since the last full back-up?
    Differential Backup
  • What software intends to correct vulnerability to hacking or viral infection?
    Security patch
  • It monitors the initial security accreditation of an information system for tracking of changes.
    Continuous Assessment
  • What complex process that organizations use to manage the effects and cost of innovation and obsolescence?
    Technology governance
  • It occurs when an attacker or trusted insider steals data from a computer system and demands compensation for its return
    Information Extortion
  • What control strategy attempts to shift risk to other assets, processes, etc.?
    Transfer
  • _____ is the determination of the extent to which the organization's information assets are exposed.
    Risk control
  • What utility that verifies installation of TCP/IP, bound to the Network Interface Card (NIC) and correctly configured on a computer attached to a network?
    PING
  • What OSI (Open Systems Interconnection) model that controls the conversations between different computers and includes authentication?
    Session
  • What type of network redundancy that provides communications and network access between two switching centers?
    Diverse trunking
  • _____ consists of the user matrices, and capability tables that govern the rights and privileges of users.
    Access control list
  • What network mechanism intended to accommodate real-time traffic as well as bulk data transfer?
    Asynchronous transfer mode
  • What Ethernet wiring standard for 10 Mbps with a maximum distance of approximately 100 meters?
    10Base-T
  • What type of version that protects unauthorized network access by utilizing a set- up password?
    WPA2-Personal
  • What Microsoft features that allow installing Windows server versions network location without even going to the server computer?
    Remote Installation Services
  • What IP address used by the virtual machine to communicate over the physical network?
    Provider address
  • It is an act whether intentional or unintentional that can cause damage to or otherwise compromises information and/or the systems that support it.
    Attack
  • It ensures that information and programs change only in a specified and authorized manner.
    Integrity
  • _____ is a set of directives that describes what actions user must agree to follow for granting access to a network or to the Internet.
    End-user policy
  • Which of the following Biometric technologies evaluate on three basic criteria?
    False reject rate, False accept rate, Crossover error rate
  • What hardware device that allows data to flow from one discrete network to another?
    Gateway
  • A type of network that connects electronic devices and send information within the user's immediate area.
    Personal Area Network
  • _____ is a two or more PCs are connected and share resources without going through a separate server computer.
    Peer to peer network