CSS COC3 SET. C

Cards (30)

  • What command that allows back-up and restore the operating system, volumes, files, folders, and applications from a command prompt?
    wbadmin
  • What log files that conserves disk space by ensuring that the performance log file will not continue growing over certain limits?
    Circular Logging
  • _____ is a group of independent servers that are accessed/presented to the network as a single system.
    Cluster
  • Which of the following has special privileges on a multi-user computer system and with concern after security?
    System administrator
  • What PowerShell cmdlets used to read AD object data and return it to the screen for reading, exporting, or piping into another cmdlet as a variable value?
    Get-AdObject
  • What second clustering technology provides by corresponding client requests across several servers with replicated configurations?
    Network Load Balancing
  • It allows viewing of all updates selected to upgrade system.
    Review and Install Updates
  • What Distributed File System functions-used to provide a single namespace that can contain several distinct or unique data sets?
    Distributed data consolidation
  • It enables administrators to define the types of file that can save within a Windows volume and folder.
    File Screening
  • What is the first step in Configuration Management?
    Identify Change
  • _____ is the comprehensive evaluation of the technical and nontechnical security controls of an IT system.
    Certification
  • What technique used to gain unauthorized access to computers, wherein the intruder sends messages with a source IP address?
    Spoofing
  • What control strategy is the choice to do nothing, to protect a vulnerability and to take the outcome of its exploitation?
    Accept
  • The examination and documentation of the security posture of an organization's information technology and the risks its faces.
    Risk identification
  • What protocol that provides a central place to store email messages?
    Post Office Protocol
  • Which of the following is the most efficient in transferring larger files?
    File Transfer Protocol
  • What Network Lifecycle that consists of installing the hardware, makes up the physical part of the network, and configuring the files?
    Setting up the network
  • The security process designed by strategic planners and implemented by the security administration of the organization.
    Managerial control
  • What type of transmission mode that data can be sent only in one direction e.g. communication is unidirectional?
    Simplex
  • A media type of 10-megabit Ethernet that compose of thick-wire coaxial cable with a maximum segment length of 500 meters.
    10BASE-5
  • The network security standard that tries to make connections between a router and wireless devices faster and easier.
    WPS
  • What type of connection that requires authentication through a user name and password?
    PPTP
  • What implementation phase that ensures effective control through established verification techniques and procedures?
    Security certification
  • _____ is an information asset suffering damage, unintended modification or disclosure.
    Loss
  • It is responsible for configuring the hardware and software to ensure that the computer is running smoothly.
    Systems administrator
  • What virtual network name used in managing a PowerShell?
    Routing domain
  • What method that adds an extra layer of protection to the process of authentication and may require the user to enter a verification code?
    Two-factor
  • Which of the following factors that authenticates credentials information of the user possessions, including username and password?
    Knowledge factor
  • What permission that gives authority to open and able to lists its content?
    Read
  • A type of server that allows the central administration and management of network users and network resources.
    Directory server