CSS COC3 SET. C

    Cards (30)

    • What command that allows back-up and restore the operating system, volumes, files, folders, and applications from a command prompt?
      wbadmin
    • What log files that conserves disk space by ensuring that the performance log file will not continue growing over certain limits?
      Circular Logging
    • _____ is a group of independent servers that are accessed/presented to the network as a single system.
      Cluster
    • Which of the following has special privileges on a multi-user computer system and with concern after security?
      System administrator
    • What PowerShell cmdlets used to read AD object data and return it to the screen for reading, exporting, or piping into another cmdlet as a variable value?
      Get-AdObject
    • What second clustering technology provides by corresponding client requests across several servers with replicated configurations?
      Network Load Balancing
    • It allows viewing of all updates selected to upgrade system.
      Review and Install Updates
    • What Distributed File System functions-used to provide a single namespace that can contain several distinct or unique data sets?
      Distributed data consolidation
    • It enables administrators to define the types of file that can save within a Windows volume and folder.
      File Screening
    • What is the first step in Configuration Management?
      Identify Change
    • _____ is the comprehensive evaluation of the technical and nontechnical security controls of an IT system.
      Certification
    • What technique used to gain unauthorized access to computers, wherein the intruder sends messages with a source IP address?
      Spoofing
    • What control strategy is the choice to do nothing, to protect a vulnerability and to take the outcome of its exploitation?
      Accept
    • The examination and documentation of the security posture of an organization's information technology and the risks its faces.
      Risk identification
    • What protocol that provides a central place to store email messages?
      Post Office Protocol
    • Which of the following is the most efficient in transferring larger files?
      File Transfer Protocol
    • What Network Lifecycle that consists of installing the hardware, makes up the physical part of the network, and configuring the files?
      Setting up the network
    • The security process designed by strategic planners and implemented by the security administration of the organization.
      Managerial control
    • What type of transmission mode that data can be sent only in one direction e.g. communication is unidirectional?
      Simplex
    • A media type of 10-megabit Ethernet that compose of thick-wire coaxial cable with a maximum segment length of 500 meters.
      10BASE-5
    • The network security standard that tries to make connections between a router and wireless devices faster and easier.
      WPS
    • What type of connection that requires authentication through a user name and password?
      PPTP
    • What implementation phase that ensures effective control through established verification techniques and procedures?
      Security certification
    • _____ is an information asset suffering damage, unintended modification or disclosure.
      Loss
    • It is responsible for configuring the hardware and software to ensure that the computer is running smoothly.
      Systems administrator
    • What virtual network name used in managing a PowerShell?
      Routing domain
    • What method that adds an extra layer of protection to the process of authentication and may require the user to enter a verification code?
      Two-factor
    • Which of the following factors that authenticates credentials information of the user possessions, including username and password?
      Knowledge factor
    • What permission that gives authority to open and able to lists its content?
      Read
    • A type of server that allows the central administration and management of network users and network resources.
      Directory server