Fill This Form To Receive Instant Help
Homework answers / question archive / Saint Leo University COM 520 Chapter 11 1)The term attack surface refers to all of the software a computer runs that is vulnerable to attack
Saint Leo University
COM 520
Chapter 11
1)The term attack surface refers to all of the software a computer runs that is vulnerable to attack.
A. True
B. False
2. The best way to secure a service is to disable it.
A. True
B. False
3. The process of making configuration changes and deploying controls to reduce the attack surface is called_____________.
4. Which Windows Server 2008 R2 and Windows Server 2012 feature allows you to specify which services you want to include during the operating system installation?
A. Edition
B. Role
C. GPO
D. Configuration
5. Which Windows Server 2008 R2 and Windows Server 2012 installation option includes only
a minimal environment to just run selected services?
a. Server core
b. Foundation
c. Standard
d. Runtime
6. Which Microsoft tool guides administrators and creates policies based on least privilege to reduce the attack surface of a Windows server after installation?
a. GPO
b. MBSA c. sew
D. NMAP
7. You can use GPOs to deploy Windows Firewall rules.
a. True
b. False
8. Which of the following actions is the best action to take to secure an unneeded service?
A. Close the port. B. Disable the service.
C. Delete the service from Services.
D. Create a GPO restriction for the service.
9. You should disable the_________________user account to make it harder for
attackers to access the default escalated-privilege account.
10. AD makes securing many computers in a network more complex.
A. True B.
11. Which term describes software that defines and implements a policy that describes
the requirements to access your network? A.sew
B. VPN
C. GPO
D. NAC
12. VPNs increase security of remote connection by guaranteeing all traffic is encrypted.
A. True
B. False
13. Which new Microsoft VPN protocol makes it easy to use VPNs even through firewalls?
A. L2TP
B. SSTP
C. TLS
D. TCP
14. _______________refers to the hardware, software, policies, and procedures to manage all aspects of digital certificates.
Already member? Sign In