
Security Strategies in Windows Platforms and Applications Keywords (Chapter 11-15)
Authored by John Doe
others
Used 12+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
42 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Directory Service Restore Mode (DSRM) (Chapter 11)
A special mode that allows administrators to create an offline copy of Active Directory (AD).
A rule that handles addressing and encryption issues.
The process of making configuration changes and deploying controls to reduce the attack surface.
A solution that defines and implements a policy that describes the requirements to access your network.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Encapsulating protocol (Chapter 11)
A special mode that allows administrators to create an offline copy of Active Directory (AD).
A rule that handles addressing and encryption issues.
The process of making configuration changes and deploying controls to reduce the attack surface.
A solution that defines and implements a policy that describes the requirements to access your network.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Hardening (Chapter 11)
A special mode that allows administrators to create an offline copy of Active Directory (AD).
A rule that handles addressing and encryption issues.
The process of making configuration changes and deploying controls to reduce the attack surface.
A solution that defines and implements a policy that describes the requirements to access your network.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Network access control (NAC) (Chapter 11)
A special mode that allows administrators to create an offline copy of Active Directory (AD).
A rule that handles addressing and encryption issues.
The process of making configuration changes and deploying controls to reduce the attack surface.
A solution that defines and implements a policy that describes the requirements to access your network.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
nmap (Chapter 11)
An open source utility used to scan one or more computers or network devices for open ports and other information.
A rule that handles addressing and encryption issues.
The process of making configuration changes and deploying controls to reduce the attack surface.
A solution that defines and implements a policy that describes the requirements to access your network.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Role (Chapter 11)
A predefined set of services, programs, and configuration settings that enable a computer to fulfill a specific set of requirements.
A rule that handles addressing and encryption issues.
The process of making configuration changes and deploying controls to reduce the attack surface.
A solution that defines and implements a policy that describes the requirements to access your network.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Security Compliance Toolkit (SCT) (Chapter 11)
A set of tools that help organizations secure Microsoft products and systems.
A rule that handles addressing and encryption issues.
The process of making configuration changes and deploying controls to reduce the attack surface.
A solution that defines and implements a policy that describes the requirements to access your network.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?