Fill This Form To Receive Instant Help

Help in Homework
trustpilot ratings
google ratings


Homework answers / question archive / Saint Leo University COM 520 Chapter 11 1)The term attack surface refers to all of the software a computer runs that is vulnerable to attack

Saint Leo University COM 520 Chapter 11 1)The term attack surface refers to all of the software a computer runs that is vulnerable to attack

Computer Science

Saint Leo University

COM 520

Chapter 11

1)The term attack surface refers to all of the software a computer runs that is vulnerable to attack.

A.            True

B.            False

2.            The best way to secure a service is to disable it.

A.            True

B.            False

3.            The process of making configuration changes and deploying controls to reduce the attack surface is called_____________.

4.            Which Windows Server 2008 R2 and Windows Server 2012 feature allows you to specify which services you want to include during the operating system installation?

A.            Edition

B.            Role

C.            GPO

D.            Configuration

5.            Which Windows Server 2008 R2 and Windows Server 2012 installation option includes only

a minimal environment to just run selected services?

a.            Server core

b.            Foundation

c.             Standard

d.            Runtime

6.            Which Microsoft tool guides administrators and creates policies based on least privilege to reduce the attack surface of a Windows server after installation?

a.            GPO

b.            MBSA c. sew

D. NMAP

7.            You can use GPOs to deploy Windows Firewall rules.

a.            True

b.            False

8.            Which of the following actions is the best action to take to secure an unneeded service?

A.            Close the port. B. Disable the service.

C.            Delete the service from Services.

D.            Create a GPO restriction for the service.

9.            You should disable the_________________user account to make it harder for

 

attackers to access the default escalated-privilege account.

10.          AD makes securing many computers in a network more complex.

A.            True B.

 

 

11.          Which term describes software that defines and implements a policy that describes

the requirements to access your network? A.sew

B.            VPN

C.            GPO

D.            NAC

12.          VPNs increase security of remote connection by guaranteeing all traffic is encrypted.

A.            True

B.            False

13.          Which new Microsoft VPN protocol makes it easy to use VPNs even through firewalls?

A.            L2TP

B.            SSTP

C.            TLS

D.            TCP

14.          _______________refers to the hardware, software, policies, and procedures to manage all aspects of digital certificates.

 

 

 

 

 

 

 

Option 1

Low Cost Option
Download this past answer in few clicks

2.83 USD

PURCHASE SOLUTION

Already member?


Option 2

Custom new solution created by our subject matter experts

GET A QUOTE