Trusted by Students Everywhere
Why Choose Us?
0% AI Guarantee

Human-written only.

24/7 Support

Anytime, anywhere.

Plagiarism Free

100% Original.

Expert Tutors

Masters & PhDs.

100% Confidential

Your privacy matters.

On-Time Delivery

Never miss a deadline.

Saint Leo University COM 520 Chapter 10 1)Security administration is the process of developing an organization's security policy

Computer Science Aug 13, 2021

Saint Leo University

COM 520

Chapter 10

1)Security administration is the process of developing an organization's security policy.

A.            True

B.            False

2.            What is the most important feature of PDCA?

A.            PDCA was developed for security administration.

B.            PDCA is a Microsoft standard.

 

C.            PDCA repeats and does not end.

D.            PDCA was developed by Dr. Deming.

D.            Enforce physical security controls.

3.            If time to recover exceeds the recovery goal. which property of security have you violated?

A.            Availability

B.            Integrity

C.            Confidentiality

D.            Consistency

4.            Which of the following devices or software programs can detect intrusions? (Select two.)

A.            Firewall

B.            IDS

C.            IPS

D.            NAT

5.            A valid backup is an integral part of your_________________.

6.            Protecting both integrity and confidentiality depends largely on knowing a user's identity.

A.            True

B.            False

7.            A DACL is used primarily to enforce which security properties? (Select two.)

A.            Integrity

B.            Consistency

C.            Confidentiality

D.            Availability

8.            You can use the___________tool to ensure your Microsoft operating system is up to date and has all patches and service packs installed.

9.            Active Directory requires that you create multiple GPOs, one for each computer.

A.            True

B.            False

10.          Which of the following terms is best described as a collection of requirements users must meet, typically within a specific system or environment?

A.            Security policy

B.            Security standard

C.            Security procedure

D.            Security guideline

 

11.          Which type of Windows component would you use to define which users can create files in a folder?

A.            DACL

B.            NAT

C.            User right

D.            IPSec rule

12.          Which tool would you use to edit the setting that disables user-installed desktop gadgets for all users?

A.            Local Group Policy Editor

B.            MBSA

C.            GPMC

D.            Performance Monitor

13.          Microsoft provides a command-line utility for creating backups on Windows server and workstation operating systems.

A.            True

B.            False

 

 

 

 

 

Archived Solution
Unlocked Solution

You have full access to this solution. To save a copy with all formatting and attachments, use the button below.

Already a member? Sign In
Important Note: This solution is from our archive and has been purchased by others. Submitting it as-is may trigger plagiarism detection. Use it for reference only.

For ready-to-submit work, please order a fresh solution below.

Or get 100% fresh solution
Get Custom Quote
Secure Payment