Save
CSS COC3
For 4th Quarter Exam
CSS COC3 SET. B
Save
Share
Learn
Content
Leaderboard
Learn
Created by
TJVL
Visit profile
Cards (30)
What troubleshooting command that checks the state of domain controllers in forest and sends back a report of any problems?
Dcdiag
View source
What log files that record performance statistics based on the various performance objects and instances available in Performance Monitor?
Counter Logs
View source
What node in the cluster that is currently running to at least one Service and Application group?
Active node
View source
What feature in Windows Server provides the ability to migrate workloads between a source and target cluster?
Failover
View source
_____ is an evaluation that performs periodically as part of a full security audit.
Penetration test
View source
The essential component of monitoring the status of security controls and identifying potential security-related problems in information systems.
Configuration Management
View source
What command that allows import and export data from Active Directory?
Csvde
View source
Group Policy setting is based on _____.
Administrative templates
View source
What Distributed File System that can be configured automatically the synchronize folders?
Automated data replication
View source
_____ enables administrators to configure storage thresholds on particular sets of data stored on server NTFS volumes.
File System Quota
View source
What authorizes an Information Technology system to process, store, or transmit information in terms of security management?
Accreditation
View source
An automated software program that executes certain commands when it receives a specific input is _____.
Bot
View source
What network control strategy attempts to reduce the impact caused by the exploitation of vulnerability?
Mitigate
View source
The process of reformatting a computer from scratch after a catastrophic system failure is _____.
Bare metal restore
View source
_____ is a way to identify a specific process to which an Internet or other network message forwarded when it arrives at a server.
Port number
View source
It contains the addresses of the recipient and the sender on how to handle the packet as it travels through each layer of the protocol suite.
Header
View source
What Network Lifecycle that involves making decision about the type of network and best suits the needs of organization?
Designing a network
View source
What is the specific policy that governs how a security system reacts to the data it receives?
Configuration rule policy
View source
Which of the following modes which data can transmit in both directions on a signal carrier but not at the same time?
Half duplex Mode
View source
What media types of 10 megabit Ethernet that compose of Thin-wire coaxial cable with a maximum segment length of 185 meters?
10BASE-2
View source
What type of version that verifies network users through a server and requires a more complicated setup, but provides additional security?
WPA2-Enterprise
View source
_____ is generally used by telephone companies that also provide Internet connections.
Point to Point Protocol of Ethernet (PPPoE)
View source
What implementation phase that provides necessary security authorization of an information system requires to process, store, or transmit?
Security accreditation
View source
What IP address used by the virtual machine to communicate over the physical network?
Provider address
View source
A set of necessary activities that performs a specific safety task or function is _____.
Security procedure
View source
Which of the following policies that provide a high-level treatment of security concepts that are important to the company?
Governing policies
View source
What unique points of reference that are digitized, stored in an encrypted format for comparison and with scanned human characteristics?
Minutiae
View source
_____ is a process which numbers of users grant access and certain privileges to systems, resources or information.
Access control
View source
What file system that allows users to access files and directories located on remote computers and treat those files and directories as local?
Log Structured File System (LSFS)
View source
_____ is used to store the user documents with a large amount of memory and storage space.
File server
View source