CSS COC3 SET. D

Cards (30)

  • Which of the following displays the measures and various real-time statistics on the system's performance?
    View Current Activity
  • It gives service, application, IP address, disk, or network name defined and managed by the cluster.
    Cluster resource
  • It contains information about intrusion detection systems vulnerabilities, and discuss how to use in defending networks.
    Bugtraq focus-ids
  • What extension file deploys a non-MSI software in Group Policy Object?
    zap
  • What special boot mode is for repairing or recovering Active Directory?
    Directory Services Restore Mode
  • What active directory protocol used to access data from a database?
    Lightweight Directory Access Protocol (LDAP)
  • Displays the exact settings that applies to individual users, computers, domains, and sites after inheritance and filtering have taken effect.
    Resultant Set of Policy
  • What database that contains all of the information pertaining to objects within all domains in the Active Directory environment?
    Global Catalog
  • Which of the following commands used to certify the peer name resolution in Active Directory?
    NSLOOKUP
  • In Windows Server 2008, it helps organizations categorize data stored on Windows file server.
    File Classification Infrastructure
  • What program or device that can monitor data traveling over a network?
    Sniffers
  • What term used to refer when a system is unavailable?
    Downtime
  • A Repadmin command shows the amount of time between replications.
    Latency
  • A technical term as the common reasons for system and communication failures is _____.
    Network outage
  • Which of the following also known as gateways?
    Proxy server
  • Which of the following protocols forms the foundation for communication on the World Wide Web (WWW)?
    Hypertext Transfer Protocol
  • What Network Lifecycle that consists of ongoing tasks, typically adding new host machines and administering security?
    Maintaining the network
  • A network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
    Firewall
  • What type of transmission mode that sends data where both parties can communicate with each other simultaneously?
    Full duplex Mode
  • What media types of 10-megabit Ethernet that compose of broadband coaxial cable carrying multiple baseband channels for a maximum length of 3,600 meters?
    10BASE-36
  • What node in a computer network uses the internet protocol suite that serves as the router to other networks?
    Default Gateway
  • The implementation phase ensures _____through operational site, where information system deployed for operation.
    System integration
  • The setting that defines the authentication and encryption methods, which used to protect the network.
    Security Type
  • The analysis that identifies the protection requirements for the system is through a formal _____ process.
    Risk assessment
  • In the context of security, _____ is a privilege or assigned permission for the use of computer data or resources.
    Access
  • It refers to keeping of sensitive information from disclosing to unauthorized recipients and control who gets to read information.
    Confidentiality
  • In a security context, is a category of user authentication credentials based on items that the user has, like mobile phones that can generate one time password or PIN.
    Possession factor
  • It is valid for only single login session or transaction on a computer system.
    One-time password
  • In Windows 7, this permission gives authority to add, remove and rename files stored in the directory.
    Write
  • A type of server that occupies a large portion of computing territory between the database server and end user.
    Application server