CSS COC3 SET. A

    Cards (30)

    • What Performance Monitor allows viewing of information that previously saved to a log file?
      View Log File Data
    • A service role in organization that manage to validate identification of entities such as websites, email and network communication needs to be encrypted?
      Certification Authority
    • What Application group that contains a Client Access Point and with at least one application specific resource?
      Virtual cluster server
    • _____ is a lightweight command that used in the PowerShell environment.
      Cmdlet
    • What services in Windows Server that enables administrators to migrate data to a lower-cost and tape media on file servers?
      Remote Storage Service
    • What Security Risk Assessments that used to respond to network change requests and network architectural design proposals?
      Network connectivity
    • What utility of Microsoft website that allows Windows users to update Operating Systems by downloading updated files (critical and noncritical software updates)?
      Windows Update
    • What type of backup that makes a copy of data that has changed since the last full back-up?
      Differential Backup
    • What software intends to correct vulnerability to hacking or viral infection?
      Security patch
    • It monitors the initial security accreditation of an information system for tracking of changes.
      Continuous Assessment
    • What complex process that organizations use to manage the effects and cost of innovation and obsolescence?
      Technology governance
    • It occurs when an attacker or trusted insider steals data from a computer system and demands compensation for its return
      Information Extortion
    • What control strategy attempts to shift risk to other assets, processes, etc.?
      Transfer
    • _____ is the determination of the extent to which the organization's information assets are exposed.
      Risk control
    • What utility that verifies installation of TCP/IP, bound to the Network Interface Card (NIC) and correctly configured on a computer attached to a network?
      PING
    • What OSI (Open Systems Interconnection) model that controls the conversations between different computers and includes authentication?
      Session
    • What type of network redundancy that provides communications and network access between two switching centers?
      Diverse trunking
    • _____ consists of the user matrices, and capability tables that govern the rights and privileges of users.
      Access control list
    • What network mechanism intended to accommodate real-time traffic as well as bulk data transfer?
      Asynchronous transfer mode
    • What Ethernet wiring standard for 10 Mbps with a maximum distance of approximately 100 meters?
      10Base-T
    • What type of version that protects unauthorized network access by utilizing a set- up password?
      WPA2-Personal
    • What Microsoft features that allow installing Windows server versions network location without even going to the server computer?
      Remote Installation Services
    • What IP address used by the virtual machine to communicate over the physical network?
      Provider address
    • It is an act whether intentional or unintentional that can cause damage to or otherwise compromises information and/or the systems that support it.
      Attack
    • It ensures that information and programs change only in a specified and authorized manner.
      Integrity
    • _____ is a set of directives that describes what actions user must agree to follow for granting access to a network or to the Internet.
      End-user policy
    • Which of the following Biometric technologies evaluate on three basic criteria?
      False reject rate, False accept rate, Crossover error rate
    • What hardware device that allows data to flow from one discrete network to another?
      Gateway
    • A type of network that connects electronic devices and send information within the user's immediate area.
      Personal Area Network
    • _____ is a two or more PCs are connected and share resources without going through a separate server computer.
      Peer to peer network