Search Header Logo

Security Strategies in Windows Platforms and Applications Keywords (Chapter 11-15)

Authored by John Doe

others

Used 12+ times

Security Strategies in Windows Platforms and Applications Keywords (Chapter 11-15)
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

42 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Directory Service Restore Mode (DSRM) (Chapter 11)

A special mode that allows administrators to create an offline copy of Active Directory (AD).
A rule that handles addressing and encryption issues.
The process of making configuration changes and deploying controls to reduce the attack surface.
A solution that defines and implements a policy that describes the requirements to access your network.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Encapsulating protocol (Chapter 11)

A special mode that allows administrators to create an offline copy of Active Directory (AD).
A rule that handles addressing and encryption issues.
The process of making configuration changes and deploying controls to reduce the attack surface.
A solution that defines and implements a policy that describes the requirements to access your network.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Hardening (Chapter 11)

A special mode that allows administrators to create an offline copy of Active Directory (AD).
A rule that handles addressing and encryption issues.
The process of making configuration changes and deploying controls to reduce the attack surface.
A solution that defines and implements a policy that describes the requirements to access your network.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Network access control (NAC) (Chapter 11)

A special mode that allows administrators to create an offline copy of Active Directory (AD).
A rule that handles addressing and encryption issues.
The process of making configuration changes and deploying controls to reduce the attack surface.
A solution that defines and implements a policy that describes the requirements to access your network.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

nmap (Chapter 11)

An open source utility used to scan one or more computers or network devices for open ports and other information.
A rule that handles addressing and encryption issues.
The process of making configuration changes and deploying controls to reduce the attack surface.
A solution that defines and implements a policy that describes the requirements to access your network.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Role (Chapter 11)

A predefined set of services, programs, and configuration settings that enable a computer to fulfill a specific set of requirements.
A rule that handles addressing and encryption issues.
The process of making configuration changes and deploying controls to reduce the attack surface.
A solution that defines and implements a policy that describes the requirements to access your network.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Security Compliance Toolkit (SCT) (Chapter 11)

A set of tools that help organizations secure Microsoft products and systems.
A rule that handles addressing and encryption issues.
The process of making configuration changes and deploying controls to reduce the attack surface.
A solution that defines and implements a policy that describes the requirements to access your network.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?