Trusted by Students Everywhere
Why Choose Us?
0% AI Guarantee

Human-written only.

24/7 Support

Anytime, anywhere.

Plagiarism Free

100% Original.

Expert Tutors

Masters & PhDs.

100% Confidential

Your privacy matters.

On-Time Delivery

Never miss a deadline.

Saint Leo University COM 520 Chapter 7 1)A baseline is the initial settings in a newly installed system

Computer Science Aug 13, 2021

Saint Leo University

COM 520

Chapter 7

1)A baseline is the initial settings in a newly installed system.

A.            True

B.            False

2.            A baseline, also called a___________is a collection of settings at a specific point in time.

3.            Which Microsoft tool analyzes a computer's settings and compares its configuration with a baseline?

A.            SCA

B.            MBSA

C.            NetChk

D.            OSI

4.            Stored settings that make up a baseline are stored in which type of files?

A.            Baseline configuration

B.            Baseline database

C.            Security template

D.            Security object

5.            The Security Configuration and Analysis tool operates as a snap-in to the____________

 

6.            Which command-line tool provides the same scanning capability as SCA?

A.            Secedit

B.            Mbsacli

C.            Scacli

D.            Mbsaedit

7.            Which of the following products does MBSA

not analyze?

A.            IIS

B.            SQL Server

C.            Adobe Acrobat

D. Windows 7

8.            MBSA automatically ranks vulnerabilities by severity.

A.            True

B.            False

9.            Which command-line tool provides the same scanning capability as MBSA?

A.            Secedit

B.            Mbsacli

C.            Scacli

D.            Mbsaedit

10.          Which security scanner looks for weak passwords?

A.            SCA

B.            OSI

C.            NetChk Protect

D.            MBSA

11.          What does NetChk Protect Limited do that MBSA does not do?

 

A.            Scans the latest Microsoft products

B.            Scans legacy Microsoft products

C.            Scans all Microsoft products

D.            Scans selected Microsoft products

12.          Which security scanner runs in a Web browser and doesn't require that you install a product before scanning?

A.            NetChk Protect Limited

B.            MBSA

C.            OSI

D.            PSI

13.          Which of the following statements best describe the relationship between profiling and auditing?

A.            Auditing is often a part of profiling.

B.            Profiling is often a part of auditing.

C.            Profiling and auditing are interchangeable terms.

D.            If auditing is in place, profiling is not necessary.

14.          When designing an audit strategy, you should log access attempts on the____________ number of objects.

 

15.          What is the main purpose of an audit?

A.            To uncover problems

B.            To catch errors

C.            To validate compliance

D.            To standardize configurations

 

 

Archived Solution
Unlocked Solution

You have full access to this solution. To save a copy with all formatting and attachments, use the button below.

Already a member? Sign In
Important Note: This solution is from our archive and has been purchased by others. Submitting it as-is may trigger plagiarism detection. Use it for reference only.

For ready-to-submit work, please order a fresh solution below.

Or get 100% fresh solution
Get Custom Quote
Secure Payment