THIS IS OPERATING SYSTEMS 1. Servers in a demilitarized zone (DMZ) may be accessed by unauthorized users without risk to
Posted: Fri Jul 01, 2022 5:51 am
THIS IS OPERATING SYSTEMS
1. Servers in a demilitarized zone (DMZ) may be accessed byunauthorized users without risk to the trusted network.
Group of answer choices
True
False
2. Which of the following can you use to maintain WindowsFirewall settings?
Group of answer choices
Windows Firewall with Advanced Security MMC snap-in
Intrusion prevention system (IPS)
Windows Performance Monitor
Intrusion detection system (IDS)
3. Which of the following is true regarding Windows 10 andWindows Server?
Group of answer choices
Windows Server allows you to select which programs to installwhile installing the operating system.
Windows 10 allows you to remove unwanted components whileinstalling the operating system.
Windows Server requires that you install the entire operatingsystem before selecting any programs you want to remove.
Each Windows Server edition supports the same roles.
4. To prevent Windows from starting an installed service, changethe startup type to Enabled.
Group of answer choices
True
False
5. An attacker can infect a computer when the user plays amalicious sound file on a website.
Group of answer choices
True
False
6. Which item in the six steps to handling incidents includes abusiness continuity plan (BCP)?
Group of answer choices
Eradication
Recovery
Identification
Preparation
7. During a lessons learned meeting, computer security incidentresponse team (CSIRT) members discussed the perceived slow andinconsistent progress when responding to incidents. The CSIRTleader and members discussed options to improve on this. Which ofthe following decisions might best improve this issue?
Group of answer choices
Simplify and consolidate, however possible, businessprocesses
Cross train to minimize CSIRT members having only oneexpertise
Strengthen the CSIRT by hiring additional members
Utilize a Security Orchestration, Automation and Response (SOAR)tool
1. Servers in a demilitarized zone (DMZ) may be accessed byunauthorized users without risk to the trusted network.
Group of answer choices
True
False
2. Which of the following can you use to maintain WindowsFirewall settings?
Group of answer choices
Windows Firewall with Advanced Security MMC snap-in
Intrusion prevention system (IPS)
Windows Performance Monitor
Intrusion detection system (IDS)
3. Which of the following is true regarding Windows 10 andWindows Server?
Group of answer choices
Windows Server allows you to select which programs to installwhile installing the operating system.
Windows 10 allows you to remove unwanted components whileinstalling the operating system.
Windows Server requires that you install the entire operatingsystem before selecting any programs you want to remove.
Each Windows Server edition supports the same roles.
4. To prevent Windows from starting an installed service, changethe startup type to Enabled.
Group of answer choices
True
False
5. An attacker can infect a computer when the user plays amalicious sound file on a website.
Group of answer choices
True
False
6. Which item in the six steps to handling incidents includes abusiness continuity plan (BCP)?
Group of answer choices
Eradication
Recovery
Identification
Preparation
7. During a lessons learned meeting, computer security incidentresponse team (CSIRT) members discussed the perceived slow andinconsistent progress when responding to incidents. The CSIRTleader and members discussed options to improve on this. Which ofthe following decisions might best improve this issue?
Group of answer choices
Simplify and consolidate, however possible, businessprocesses
Cross train to minimize CSIRT members having only oneexpertise
Strengthen the CSIRT by hiring additional members
Utilize a Security Orchestration, Automation and Response (SOAR)tool