What command that allows back-up and restore the operating system, volumes, files, folders, and applications from a command prompt?
wbadmin
What log files that conserves disk space by ensuring that the performance log file will not continue growing over certain limits?
Circular Logging
_____ is a group of independent servers that are accessed/presented to the network as a single system.
Cluster
Which of the following has special privileges on a multi-user computer system and with concern after security?
System administrator
What PowerShell cmdlets used to read AD object data and return it to the screen for reading, exporting, or piping into another cmdlet as a variable value?
Get-AdObject
What second clustering technology provides by corresponding client requests across several servers with replicated configurations?
Network Load Balancing
It allows viewing of all updates selected to upgrade system.
Review and Install Updates
What Distributed File System functions-used to provide a single namespace that can contain several distinct or unique data sets?
Distributed data consolidation
It enables administrators to define the types of file that can save within a Windows volume and folder.
File Screening
What is the first step in Configuration Management?
Identify Change
_____ is the comprehensive evaluation of the technical and nontechnical security controls of an IT system.
Certification
What technique used to gain unauthorized access to computers, wherein the intruder sends messages with a source IP address?
Spoofing
What control strategy is the choice to do nothing, to protect a vulnerability and to take the outcome of its exploitation?
Accept
The examination and documentation of the security posture of an organization's information technology and the risks its faces.
Risk identification
What protocol that provides a central place to store email messages?
Post Office Protocol
Which of the following is the most efficient in transferring larger files?
File Transfer Protocol
What Network Lifecycle that consists of installing the hardware, makes up the physical part of the network, and configuring the files?
Setting up the network
The security process designed by strategic planners and implemented by the security administration of the organization.
Managerial control
What type of transmission mode that data can be sent only in one direction e.g. communication is unidirectional?
Simplex
A media type of 10-megabit Ethernet that compose of thick-wire coaxial cable with a maximum segment length of 500 meters.
10BASE-5
The network security standard that tries to make connections between a router and wireless devices faster and easier.
WPS
What type of connection that requires authentication through a user name and password?
PPTP
What implementation phase that ensures effective control through established verification techniques and procedures?
Security certification
_____ is an information asset suffering damage, unintended modification or disclosure.
Loss
It is responsible for configuring the hardware and software to ensure that the computer is running smoothly.
Systems administrator
What virtual network name used in managing a PowerShell?
Routing domain
What method that adds an extra layer of protection to the process of authentication and may require the user to enter a verification code?
Two-factor
Which of the following factors that authenticates credentials information of the user possessions, including username and password?
Knowledge factor
What permission that gives authority to open and able to lists its content?
Read
A type of server that allows the central administration and management of network users and network resources.