Fill This Form To Receive Instant Help

Help in Homework
trustpilot ratings
google ratings


Homework answers / question archive / Saint Leo University COM 520 Chapter 10 1)Security administration is the process of developing an organization's security policy

Saint Leo University COM 520 Chapter 10 1)Security administration is the process of developing an organization's security policy

Computer Science

Saint Leo University

COM 520

Chapter 10

1)Security administration is the process of developing an organization's security policy.

A.            True

B.            False

2.            What is the most important feature of PDCA?

A.            PDCA was developed for security administration.

B.            PDCA is a Microsoft standard.

 

C.            PDCA repeats and does not end.

D.            PDCA was developed by Dr. Deming.

D.            Enforce physical security controls.

3.            If time to recover exceeds the recovery goal. which property of security have you violated?

A.            Availability

B.            Integrity

C.            Confidentiality

D.            Consistency

4.            Which of the following devices or software programs can detect intrusions? (Select two.)

A.            Firewall

B.            IDS

C.            IPS

D.            NAT

5.            A valid backup is an integral part of your_________________.

6.            Protecting both integrity and confidentiality depends largely on knowing a user's identity.

A.            True

B.            False

7.            A DACL is used primarily to enforce which security properties? (Select two.)

A.            Integrity

B.            Consistency

C.            Confidentiality

D.            Availability

8.            You can use the___________tool to ensure your Microsoft operating system is up to date and has all patches and service packs installed.

9.            Active Directory requires that you create multiple GPOs, one for each computer.

A.            True

B.            False

10.          Which of the following terms is best described as a collection of requirements users must meet, typically within a specific system or environment?

A.            Security policy

B.            Security standard

C.            Security procedure

D.            Security guideline

 

11.          Which type of Windows component would you use to define which users can create files in a folder?

A.            DACL

B.            NAT

C.            User right

D.            IPSec rule

12.          Which tool would you use to edit the setting that disables user-installed desktop gadgets for all users?

A.            Local Group Policy Editor

B.            MBSA

C.            GPMC

D.            Performance Monitor

13.          Microsoft provides a command-line utility for creating backups on Windows server and workstation operating systems.

A.            True

B.            False

 

 

 

 

 

Option 1

Low Cost Option
Download this past answer in few clicks

2.83 USD

PURCHASE SOLUTION

Already member?


Option 2

Custom new solution created by our subject matter experts

GET A QUOTE

Related Questions