Save
CSS COC3
CSS COC3 SET. C
Save
Share
Learn
Content
Leaderboard
Share
Learn
Created by
TJVL
Visit profile
Cards (30)
What command that allows back-up and restore the operating system, volumes, files, folders, and applications from a command prompt?
wbadmin
View source
What log files that conserves disk space by ensuring that the performance log file will not continue growing over certain limits?
Circular Logging
View source
_____ is a group of independent servers that are accessed/presented to the network as a single system.
Cluster
View source
Which of the following has special privileges on a multi-user computer system and with concern after security?
System administrator
View source
What PowerShell cmdlets used to read AD object data and return it to the screen for reading, exporting, or piping into another cmdlet as a variable value?
Get-AdObject
View source
What second clustering technology provides by corresponding client requests across several servers with replicated configurations?
Network Load Balancing
View source
It allows viewing of all updates selected to upgrade system.
Review and Install Updates
View source
What Distributed File System functions-used to provide a single namespace that can contain several distinct or unique data sets?
Distributed data consolidation
View source
It enables administrators to define the types of file that can save within a Windows volume and folder.
File Screening
View source
What is the first step in Configuration Management?
Identify Change
View source
_____ is the comprehensive evaluation of the technical and nontechnical security controls of an IT system.
Certification
View source
What technique used to gain unauthorized access to computers, wherein the intruder sends messages with a source IP address?
Spoofing
View source
What control strategy is the choice to do nothing, to protect a vulnerability and to take the outcome of its exploitation?
Accept
View source
The examination and documentation of the security posture of an organization's information technology and the risks its faces.
Risk identification
View source
What protocol that provides a central place to store email messages?
Post Office Protocol
View source
Which of the following is the most efficient in transferring larger files?
File Transfer Protocol
View source
What Network Lifecycle that consists of installing the hardware, makes up the physical part of the network, and configuring the files?
Setting up the network
View source
The security process designed by strategic planners and implemented by the security administration of the organization.
Managerial control
View source
What type of transmission mode that data can be sent only in one direction e.g. communication is unidirectional?
Simplex
View source
A media type of 10-megabit Ethernet that compose of thick-wire coaxial cable with a maximum segment length of 500 meters.
10BASE-5
View source
The network security standard that tries to make connections between a router and wireless devices faster and easier.
WPS
View source
What type of connection that requires authentication through a user name and password?
PPTP
View source
What implementation phase that ensures effective control through established verification techniques and procedures?
Security certification
View source
_____ is an information asset suffering damage, unintended modification or disclosure.
Loss
View source
It is responsible for configuring the hardware and software to ensure that the computer is running smoothly.
Systems administrator
View source
What virtual network name used in managing a PowerShell?
Routing domain
View source
What method that adds an extra layer of protection to the process of authentication and may require the user to enter a verification code?
Two-factor
View source
Which of the following factors that authenticates credentials information of the user possessions, including username and password?
Knowledge factor
View source
What permission that gives authority to open and able to lists its content?
Read
View source
A type of server that allows the central administration and management of network users and network resources.
Directory server
View source