CSS COC3 SET. D

    Cards (30)

    • Which of the following displays the measures and various real-time statistics on the system's performance?
      View Current Activity
    • It gives service, application, IP address, disk, or network name defined and managed by the cluster.
      Cluster resource
    • It contains information about intrusion detection systems vulnerabilities, and discuss how to use in defending networks.
      Bugtraq focus-ids
    • What extension file deploys a non-MSI software in Group Policy Object?
      zap
    • What special boot mode is for repairing or recovering Active Directory?
      Directory Services Restore Mode
    • What active directory protocol used to access data from a database?
      Lightweight Directory Access Protocol (LDAP)
    • Displays the exact settings that applies to individual users, computers, domains, and sites after inheritance and filtering have taken effect.
      Resultant Set of Policy
    • What database that contains all of the information pertaining to objects within all domains in the Active Directory environment?
      Global Catalog
    • Which of the following commands used to certify the peer name resolution in Active Directory?
      NSLOOKUP
    • In Windows Server 2008, it helps organizations categorize data stored on Windows file server.
      File Classification Infrastructure
    • What program or device that can monitor data traveling over a network?
      Sniffers
    • What term used to refer when a system is unavailable?
      Downtime
    • A Repadmin command shows the amount of time between replications.
      Latency
    • A technical term as the common reasons for system and communication failures is _____.
      Network outage
    • Which of the following also known as gateways?
      Proxy server
    • Which of the following protocols forms the foundation for communication on the World Wide Web (WWW)?
      Hypertext Transfer Protocol
    • What Network Lifecycle that consists of ongoing tasks, typically adding new host machines and administering security?
      Maintaining the network
    • A network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
      Firewall
    • What type of transmission mode that sends data where both parties can communicate with each other simultaneously?
      Full duplex Mode
    • What media types of 10-megabit Ethernet that compose of broadband coaxial cable carrying multiple baseband channels for a maximum length of 3,600 meters?
      10BASE-36
    • What node in a computer network uses the internet protocol suite that serves as the router to other networks?
      Default Gateway
    • The implementation phase ensures _____through operational site, where information system deployed for operation.
      System integration
    • The setting that defines the authentication and encryption methods, which used to protect the network.
      Security Type
    • The analysis that identifies the protection requirements for the system is through a formal _____ process.
      Risk assessment
    • In the context of security, _____ is a privilege or assigned permission for the use of computer data or resources.
      Access
    • It refers to keeping of sensitive information from disclosing to unauthorized recipients and control who gets to read information.
      Confidentiality
    • In a security context, is a category of user authentication credentials based on items that the user has, like mobile phones that can generate one time password or PIN.
      Possession factor
    • It is valid for only single login session or transaction on a computer system.
      One-time password
    • In Windows 7, this permission gives authority to add, remove and rename files stored in the directory.
      Write
    • A type of server that occupies a large portion of computing territory between the database server and end user.
      Application server