Trusted by Students Everywhere
Why Choose Us?
0% AI Guarantee

Human-written only.

24/7 Support

Anytime, anywhere.

Plagiarism Free

100% Original.

Expert Tutors

Masters & PhDs.

100% Confidential

Your privacy matters.

On-Time Delivery

Never miss a deadline.

Saint Leo University COM 520 CHAPTER 15 1)Anti-malware software applies mainly to workstation computers

Computer Science Aug 13, 2021

Saint Leo University

COM 520

CHAPTER 15

1)Anti-malware software applies mainly to workstation computers.

A.            True

 

B.            False

 

2.            What is RTO?

A.            Real-time objective

B.            Recovery time objective

C.            Recovery turn over

D.            Real turn over

3.            Test your backup only when you suspect media corruption.

A.            True

B.            False

4.            Even if you use the same password for a long time, it will remain secure.

A.            True

B.            False

5.            Which of the following is an encryption recovery key that you should physically store in a separate safe location?

A.            DES

B.            AES

C.            SSTP

D.            EFS

6.            Which protocol is the newest VPN protocol from Microsoft?

A.            SSTP

B.            L2TP

C.            PPP

D.            TLS

7.            The Plan, Do, Check, Act (POCA) process is also called a_____________cycle.

8.            Which printer actions should you audit?

A.            Remote access

B.            Print nontext files

C.            Change printer destination

D.            All actions

9.            Which of the following tools will compare computer settings with your standards? (Select two.)

A.            GPMC

 

B.SCA

C. MBSA

D. POCA

10.          Change your_____________Directory Service Restore Mode (DSRM) password periodically, at least every six months.

 

11.          What program should you run on Windows Server immediately after installing the operating system?

A.            Group Policy Object (GPO)

B.            Anti-malware shield

C.            Security Configuration Wizard (SCW)

D.            Network access control (NAC)

12.          To isolate Web server computers from your internal network, place them in a segregated network called a

13.          Which of the following is the best choice for secure wireless communications?

 

 

B. WEP

C. SSID

 

A. WPA

 

 

D. TLS

 

14.          Which of the following is not a core concept of Security Development Lifecycle (SOL)?

A.            Education

B.            Availability

C.            Continuous improvement

D.            Accountability

Archived Solution
Unlocked Solution

You have full access to this solution. To save a copy with all formatting and attachments, use the button below.

Already a member? Sign In
Important Note: This solution is from our archive and has been purchased by others. Submitting it as-is may trigger plagiarism detection. Use it for reference only.

For ready-to-submit work, please order a fresh solution below.

Or get 100% fresh solution
Get Custom Quote
Secure Payment