CSS COC3 SET. E

    Cards (30)

    • It is an effective troubleshooting methodology based on structured steps toward solving the problem, regardless the type of problem.
      Systematic approach
    • What Windows Server clusters represent the combination of a network name associated with the IP address resource?
      Client Access Point
    • What two command-line utilities used to export and import Active Directory object information?
      Ldifde.exe and csvde.exe
    • What diagnostic tool that verifies the server hardware if working correctly?
      Power On Self-Test (POST)
    • What is the traditional method used to access server data and using the server message block protocol over TCP/IP?
      Windows Folder Sharing
    • What Distributed File System function that allows clients be referred to or fail over to a different server if the primary server cannot be contacted?
      Data redundancy
    • It verifies that new rules follow all risk assessment and procedural approvals, ensures removal of expired rules and detect tampering.
      Firewall rules
    • What features of Windows Server that enables data shared on a server to synchronize between the server and end-user workstations?
      Client-Side Caching
    • Set of rules for transferring files such as text, graphic images, sound, video and other multimedia files, on the World Wide Web (WWW).
      Hypertext Transfer Protocol (HTTP)
    • It enables administrators to take snapshots of the file system, allows for faster backups and point-in-time recovery without the need to access backup media.
      Volume Shadow Copy Service
    • A decoy of fly-traps systems designed to lure potential attackers away from critical systems.
      Honeypots
    • _____ is usually handled as a procedural task and assigned to an information security manager.
      Project wrap-up
    • What attack includes the execution of viruses, worms, Trojan horses, and active Web scripts with the intent to destroy or steal information?
      Malicious code
    • What control strategy attempts to prevent the exploitation of the vulnerability?
      Defend
    • What software application on a network host that acts as an intermediary between the external and internal network?
      Proxy service
    • What application that acts as an intermediary for requests from clients seeking resources?
      Proxy server
    • What set of rules that describe how software and hardware should interact within a network?
      Communications protocol
    • It ensures that all actions on a system authorized/unauthorized can attribute to an authenticated identity.
      Accountability
    • _____ is a data communication technology that enables transferring data over copper telephone lines.
      Asymmetric Digital Subscriber Line (ADSL)
    • A media type of 10-megabit Ethernet that compose of optical fiber in an Ethernet local area network.
      10BASE-F
    • A protocol that provides quick, automatic, and central management for the distribution of IP addresses within a network.
      Dynamic Host Control Protocol (DHCP)
    • What implementation phase that ensures the organization to validate and verify functionality described in the specification included in the deliverables?
      Inspection and acceptance
    • What command-line network utility that displays network connections for TCP and routing tables?
      Netstat
    • It ensures that the agreed upon security controls, planned or in placed are fully documented.
      Security planning
    • The organizational resource that needs protection, it can be logical, such as Web site, information, or data.
      Asset
    • It ensures that information and programs are changing only in a specified and authorized manner.
      Integrity
    • Which of the following factors that authenticates credentials based on the form of biometric identification, including thumb, facial recognition and any other form of biometric data?
      Inherence factor
    • What method that allows a user's account information to use by third-party services, such as Facebook, without exposing the user's password?
      Open Authorization
    • What is the permission that allows run program or a shell script?
      Execute
    • What type of server that enables large numbers users to exchange information near instantaneously and formerly known as Internet Relay Chat (IRC) Servers?
      Real-Time Communication Server
    See similar decks