CSS COC3 SET. E

Cards (30)

  • It is an effective troubleshooting methodology based on structured steps toward solving the problem, regardless the type of problem.
    Systematic approach
  • What Windows Server clusters represent the combination of a network name associated with the IP address resource?
    Client Access Point
  • What two command-line utilities used to export and import Active Directory object information?
    Ldifde.exe and csvde.exe
  • What diagnostic tool that verifies the server hardware if working correctly?
    Power On Self-Test (POST)
  • What is the traditional method used to access server data and using the server message block protocol over TCP/IP?
    Windows Folder Sharing
  • What Distributed File System function that allows clients be referred to or fail over to a different server if the primary server cannot be contacted?
    Data redundancy
  • It verifies that new rules follow all risk assessment and procedural approvals, ensures removal of expired rules and detect tampering.
    Firewall rules
  • What features of Windows Server that enables data shared on a server to synchronize between the server and end-user workstations?
    Client-Side Caching
  • Set of rules for transferring files such as text, graphic images, sound, video and other multimedia files, on the World Wide Web (WWW).
    Hypertext Transfer Protocol (HTTP)
  • It enables administrators to take snapshots of the file system, allows for faster backups and point-in-time recovery without the need to access backup media.
    Volume Shadow Copy Service
  • A decoy of fly-traps systems designed to lure potential attackers away from critical systems.
    Honeypots
  • _____ is usually handled as a procedural task and assigned to an information security manager.
    Project wrap-up
  • What attack includes the execution of viruses, worms, Trojan horses, and active Web scripts with the intent to destroy or steal information?
    Malicious code
  • What control strategy attempts to prevent the exploitation of the vulnerability?
    Defend
  • What software application on a network host that acts as an intermediary between the external and internal network?
    Proxy service
  • What application that acts as an intermediary for requests from clients seeking resources?
    Proxy server
  • What set of rules that describe how software and hardware should interact within a network?
    Communications protocol
  • It ensures that all actions on a system authorized/unauthorized can attribute to an authenticated identity.
    Accountability
  • _____ is a data communication technology that enables transferring data over copper telephone lines.
    Asymmetric Digital Subscriber Line (ADSL)
  • A media type of 10-megabit Ethernet that compose of optical fiber in an Ethernet local area network.
    10BASE-F
  • A protocol that provides quick, automatic, and central management for the distribution of IP addresses within a network.
    Dynamic Host Control Protocol (DHCP)
  • What implementation phase that ensures the organization to validate and verify functionality described in the specification included in the deliverables?
    Inspection and acceptance
  • What command-line network utility that displays network connections for TCP and routing tables?
    Netstat
  • It ensures that the agreed upon security controls, planned or in placed are fully documented.
    Security planning
  • The organizational resource that needs protection, it can be logical, such as Web site, information, or data.
    Asset
  • It ensures that information and programs are changing only in a specified and authorized manner.
    Integrity
  • Which of the following factors that authenticates credentials based on the form of biometric identification, including thumb, facial recognition and any other form of biometric data?
    Inherence factor
  • What method that allows a user's account information to use by third-party services, such as Facebook, without exposing the user's password?
    Open Authorization
  • What is the permission that allows run program or a shell script?
    Execute
  • What type of server that enables large numbers users to exchange information near instantaneously and formerly known as Internet Relay Chat (IRC) Servers?
    Real-Time Communication Server