Security Strategies in Windows Platforms and Applications Keywords (Chapter 11-15)

Security Strategies in Windows Platforms and Applications Keywords (Chapter 11-15)

42 Qs

quiz-placeholder

Similar activities

Spanish Digital Literacy Final - Computer and Internet Basics

Spanish Digital Literacy Final - Computer and Internet Basics

9th Grade

39 Qs

Rocco Hatchet Test Chapters 1-7

Rocco Hatchet Test Chapters 1-7

KG - University

40 Qs

Keycode Semester Review

Keycode Semester Review

KG - University

47 Qs

HARDWARE DAN SOFTWARE

HARDWARE DAN SOFTWARE

KG - University

46 Qs

Chemistry Part 2 Review

Chemistry Part 2 Review

KG - University

38 Qs

SIMULASI PAS TIK

SIMULASI PAS TIK

KG - University

40 Qs

Security Strategies in Windows Platforms and Applications Keywords (Chapter 11-15)

Security Strategies in Windows Platforms and Applications Keywords (Chapter 11-15)

Assessment

Quiz

others

Easy

Created by

John Doe

Used 12+ times

FREE Resource

AI

Enhance your content

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

42 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Directory Service Restore Mode (DSRM) (Chapter 11)
A special mode that allows administrators to create an offline copy of Active Directory (AD).
A rule that handles addressing and encryption issues.
The process of making configuration changes and deploying controls to reduce the attack surface.
A solution that defines and implements a policy that describes the requirements to access your network.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Encapsulating protocol (Chapter 11)
A special mode that allows administrators to create an offline copy of Active Directory (AD).
A rule that handles addressing and encryption issues.
The process of making configuration changes and deploying controls to reduce the attack surface.
A solution that defines and implements a policy that describes the requirements to access your network.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Hardening (Chapter 11)
A special mode that allows administrators to create an offline copy of Active Directory (AD).
A rule that handles addressing and encryption issues.
The process of making configuration changes and deploying controls to reduce the attack surface.
A solution that defines and implements a policy that describes the requirements to access your network.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Network access control (NAC) (Chapter 11)
A special mode that allows administrators to create an offline copy of Active Directory (AD).
A rule that handles addressing and encryption issues.
The process of making configuration changes and deploying controls to reduce the attack surface.
A solution that defines and implements a policy that describes the requirements to access your network.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

nmap (Chapter 11)
An open source utility used to scan one or more computers or network devices for open ports and other information.
A rule that handles addressing and encryption issues.
The process of making configuration changes and deploying controls to reduce the attack surface.
A solution that defines and implements a policy that describes the requirements to access your network.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Role (Chapter 11)
A predefined set of services, programs, and configuration settings that enable a computer to fulfill a specific set of requirements.
A rule that handles addressing and encryption issues.
The process of making configuration changes and deploying controls to reduce the attack surface.
A solution that defines and implements a policy that describes the requirements to access your network.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Security Compliance Toolkit (SCT) (Chapter 11)
A set of tools that help organizations secure Microsoft products and systems.
A rule that handles addressing and encryption issues.
The process of making configuration changes and deploying controls to reduce the attack surface.
A solution that defines and implements a policy that describes the requirements to access your network.

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?