Trusted by Students Everywhere
Why Choose Us?
0% AI Guarantee

Human-written only.

24/7 Support

Anytime, anywhere.

Plagiarism Free

100% Original.

Expert Tutors

Masters & PhDs.

100% Confidential

Your privacy matters.

On-Time Delivery

Never miss a deadline.

Saint Leo University COM 520 Chapter 11 1)The term attack surface refers to all of the software a computer runs that is vulnerable to attack

Computer Science Aug 13, 2021

Saint Leo University

COM 520

Chapter 11

1)The term attack surface refers to all of the software a computer runs that is vulnerable to attack.

A.            True

B.            False

2.            The best way to secure a service is to disable it.

A.            True

B.            False

3.            The process of making configuration changes and deploying controls to reduce the attack surface is called_____________.

4.            Which Windows Server 2008 R2 and Windows Server 2012 feature allows you to specify which services you want to include during the operating system installation?

A.            Edition

B.            Role

C.            GPO

D.            Configuration

5.            Which Windows Server 2008 R2 and Windows Server 2012 installation option includes only

a minimal environment to just run selected services?

a.            Server core

b.            Foundation

c.             Standard

d.            Runtime

6.            Which Microsoft tool guides administrators and creates policies based on least privilege to reduce the attack surface of a Windows server after installation?

a.            GPO

b.            MBSA c. sew

D. NMAP

7.            You can use GPOs to deploy Windows Firewall rules.

a.            True

b.            False

8.            Which of the following actions is the best action to take to secure an unneeded service?

A.            Close the port. B. Disable the service.

C.            Delete the service from Services.

D.            Create a GPO restriction for the service.

9.            You should disable the_________________user account to make it harder for

 

attackers to access the default escalated-privilege account.

10.          AD makes securing many computers in a network more complex.

A.            True B.

 

 

11.          Which term describes software that defines and implements a policy that describes

the requirements to access your network? A.sew

B.            VPN

C.            GPO

D.            NAC

12.          VPNs increase security of remote connection by guaranteeing all traffic is encrypted.

A.            True

B.            False

13.          Which new Microsoft VPN protocol makes it easy to use VPNs even through firewalls?

A.            L2TP

B.            SSTP

C.            TLS

D.            TCP

14.          _______________refers to the hardware, software, policies, and procedures to manage all aspects of digital certificates.

 

 

 

 

 

 

 

Archived Solution
Unlocked Solution

You have full access to this solution. To save a copy with all formatting and attachments, use the button below.

Already a member? Sign In
Important Note: This solution is from our archive and has been purchased by others. Submitting it as-is may trigger plagiarism detection. Use it for reference only.

For ready-to-submit work, please order a fresh solution below.

Or get 100% fresh solution
Get Custom Quote
Secure Payment