Security Strategies in Windows Platforms and Applications Keywords (Chapter 11-15)

Security Strategies in Windows Platforms and Applications Keywords (Chapter 11-15)

42 Qs

quiz-placeholder

Similar activities

 Exam DM and MD- 24

Exam DM and MD- 24

KG - University

41 Qs

Ch. 10-12 A Long Walk to Water

Ch. 10-12 A Long Walk to Water

7th Grade

40 Qs

FINAL EXAMINATION HRES23

FINAL EXAMINATION HRES23

11th Grade - University

38 Qs

10th Grade English Semester 2 Exam Review

10th Grade English Semester 2 Exam Review

12th Grade

42 Qs

Cell Structure and Function

Cell Structure and Function

9th Grade

37 Qs

Test de Orientación Técnico – Profesional

Test de Orientación Técnico – Profesional

KG - University

44 Qs

Security Strategies in Windows Platforms and Applications Keywords (Chapter 11-15)

Security Strategies in Windows Platforms and Applications Keywords (Chapter 11-15)

Assessment

Quiz

others

Easy

Created by

John Doe

Used 12+ times

FREE Resource

42 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Directory Service Restore Mode (DSRM) (Chapter 11)
A special mode that allows administrators to create an offline copy of Active Directory (AD).
A rule that handles addressing and encryption issues.
The process of making configuration changes and deploying controls to reduce the attack surface.
A solution that defines and implements a policy that describes the requirements to access your network.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Encapsulating protocol (Chapter 11)
A special mode that allows administrators to create an offline copy of Active Directory (AD).
A rule that handles addressing and encryption issues.
The process of making configuration changes and deploying controls to reduce the attack surface.
A solution that defines and implements a policy that describes the requirements to access your network.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Hardening (Chapter 11)
A special mode that allows administrators to create an offline copy of Active Directory (AD).
A rule that handles addressing and encryption issues.
The process of making configuration changes and deploying controls to reduce the attack surface.
A solution that defines and implements a policy that describes the requirements to access your network.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Network access control (NAC) (Chapter 11)
A special mode that allows administrators to create an offline copy of Active Directory (AD).
A rule that handles addressing and encryption issues.
The process of making configuration changes and deploying controls to reduce the attack surface.
A solution that defines and implements a policy that describes the requirements to access your network.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

nmap (Chapter 11)
An open source utility used to scan one or more computers or network devices for open ports and other information.
A rule that handles addressing and encryption issues.
The process of making configuration changes and deploying controls to reduce the attack surface.
A solution that defines and implements a policy that describes the requirements to access your network.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Role (Chapter 11)
A predefined set of services, programs, and configuration settings that enable a computer to fulfill a specific set of requirements.
A rule that handles addressing and encryption issues.
The process of making configuration changes and deploying controls to reduce the attack surface.
A solution that defines and implements a policy that describes the requirements to access your network.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Security Compliance Toolkit (SCT) (Chapter 11)
A set of tools that help organizations secure Microsoft products and systems.
A rule that handles addressing and encryption issues.
The process of making configuration changes and deploying controls to reduce the attack surface.
A solution that defines and implements a policy that describes the requirements to access your network.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?