The world’s Largest Sharp Brain Virtual Experts Marketplace Just a click Away
Levels Tought:
Elementary,Middle School,High School,College,University,PHD
| Teaching Since: | Apr 2017 |
| Last Sign in: | 103 Weeks Ago, 2 Days Ago |
| Questions Answered: | 4870 |
| Tutorials Posted: | 4863 |
MBA IT, Mater in Science and Technology
Devry
Jul-1996 - Jul-2000
Professor
Devry University
Mar-2010 - Oct-2016
Question:Â Question 1
|
Security incidents cannot occur when security measures such as firewalls, properly configured VPNs, and secure network procedures are in place. |
|
Security incidents can arise from a number of sources, including human error or mistakes. |
|
Deliberate actions that cause loss or harm to the organization are not considered security incidents. |
|
Organizations must simply learn to live with the impact and associated costs of security incidents. |
10 points  Â
Â
Question 2
|
accept, adjust, adapt, acclimate, and relate to security incidents. |
|
refute, deter, discourage, defend, and correct security incidents. |
|
identify, research, reject, process, and detail security incidents. |
|
prevent, detect, respond, control, and document security incidents. |
10 points  Â
Â
Question 3
|
System configuration tools |
|
System information tools |
|
System administration tools |
|
System analysis tools |
10 points  Â
Â
Question 4
|
System configuration tools |
|
System information tools |
|
System administration tools |
|
System analysis tools |
10 points  Â
Â
Question 5
|
System configuration tools |
|
System information tools |
|
System administration tools |
|
System analysis tools |
10 points  Â
Â
Question 6
|
system configuration tool. |
|
system information tool. |
|
system administration tool. |
|
system analysis tool. |
10 points  Â
Â
Question 7
|
Microsoft Baseline Security Analyzer (MBSA) |
|
Windows Computer Management |
|
Windows 2012 |
|
Windows Task Manager |
10 points  Â
Â
Question 8
|
Microsoft Baseline Security Analyzer (MBSA) |
|
Windows Computer Management |
|
Windows 2012 |
|
Windows Task Manager |
10 points  Â
Â
Question 9
|
Microsoft Baseline Security Analyzer (MBSA) |
|
Windows Computer Management |
|
Windows 2012 |
|
Windows Task Manager |
10 points  Â
Â
Question 10
|
any operating system. |
|
Linux. |
|
Windows. |
|
Linux, Apple OS X, or Windows. |
10 points  Â
Â
Question 11
|
System performance information supplements information gathered by automated tools. |
|
It is poor practice for an IT Help Desk to ask an end user to perform any information gathering tasks. |
|
A support technician should not provide instruction to a user on how to enable remote desktop services. |
|
A support technician should not use a remote log in to gather information and run tests on a user's workstation. |
10 points  Â
Â
Question 12
|
Remote desktop services should not be used to gather system performance information. |
|
Remote desktop services typically cost an organization a significant amount of time and money. |
|
Remote desktop services typically require several desk-side support visits by IT Help Desk technicians. |
|
Remote login services can become a vulnerability that is exploited both internally and externally. |
10 points  Â
Â
Question 13
|
Windows Task Manager. |
|
Windows Desktop. |
|
Windows Event Viewer. |
|
Microsoft Baseline Security Analyzer (MBSA). |
10 points  Â
Â
Question 14
|
The Setup Log |
|
The Security Log |
|
The Application Log |
|
The System Log |
10 points  Â
Â
Question 15
|
Filters should not be used on log files during an investigation into a security incident. |
|
Most log files are easily scanned by eye when looking for evidence. |
|
Using a filter can help an analyst to quickly find events of interest. |
|
The drawback to using filtering is that it increases the number of entries. |
10 points  Â
Â
Question 16
|
The Setup Log |
|
The Security Log |
|
The Application Log |
|
The System Log |
10 points  Â
Â
Question 17
|
The Setup Log |
|
The Security Log |
|
The Application Log |
|
The System Log |
10 points  Â
Â
Question 18
|
Microsoft Baseline Security Analyzer (MBSA) |
|
Windows Application Manager |
|
Windows Computer Management |
|
Windows Task Manager |
10 points  Â
Â
Question 19
|
Microsoft Baseline Security Analyzer (MBSA) |
|
Windows Application Manager |
|
Windows Computer Management |
|
Windows Task Manager |
10 points  Â
Â
Question 20
|
In the lab, you used MBSA to scan Internet Explorer and Microsoft Office for vulnerabilities. |
|
MBSA can be configured to check for missing updates and recommended security settings on Linux servers. |
|
Windows Update is more powerful than MBSA because it checks system and software settings in the registry in addition to checking for required software updates. |
|
MBSA generates a report that identifies security issues and provides recommendations for system configuration changes. |
10 points  Â