Table of Contents
Which of the following controls is an example of a physical access control method?
Locks on doors is an example of a physical access control method. Physical controls restrict or control physical access. Passwords, access control lists, and smartcards are all examples of technical controls. Even though the smartcard is a physical object, the card by itself is part of a technical implementation.
When users can initiate actions by clicking the mouse on an icon?
When users can initiate actions by clicking the mouse on an icon, the program is -driven.
Which of the following do security templates allow you to do select two?
Which of the following do security templates allow you to do? (Select two.) Security templates allow you to quickly and consistently apply settings to multiple computers in order to bring them into compliance with a security baseline.
Which of the following describes a configuration baseline?
Which of the following describes a configuration baseline? A configuration baseline is a set of consistent requirements for a workstation or server. A security baseline is a component of the configuration baseline that ensures that all workstations and servers comply with the security goals of the organization.
Which of the following is the most important way to prevent console access?
Which of the following is the most important way to prevent console access to a network switch? Disconnect the console cable when not in use.
Which of the following is a security approach that combines multiple security controls and defenses?
Layered security is a network security approach that deploys multiple security controls to protect the most vulnerable areas of your technology environment where a breach or cyberattack could occur.
Which of the following did not use a GUI environment?
the correct answer is Linux mint. Linux mint is not a GUI based operating system.
When a computer contains a single CPU it can execute <UNK> Computer instruction’s at a time?
A single processor can run only one instruction at a time: it is impossible to run more programs at the same time. A program might need some resource, such as an input device, which has a large delay, or a program might start some slow operation, such as sending output to a printer.
What do security templates allow you to do?
A security template allows you to configure security settings for different types of computers that you predetermine. You can view and configure existing Microsoft security templates through the MMC by selecting the Security Templates snap-in, shown in Figure 4.10.
How do I use security templates?
Right-click Security Configuration and Analysis, and then click Open Database. In the File name box, type the name of the database file, and then click Open. Click the security template that you want to use, and then click Open to import the entries that are contained in the template to the database.
What are GPO security settings?
Security policy settings are rules that administrators configure on a computer or multiple devices for the purpose of protecting resources on a device or network. The Security Settings extension of the Local Group Policy Editor snap-in allows you to define security configurations as part of a Group Policy Object (GPO).
What is baseline application configuration?
Application configuration baselines identify the proper settings for applications. They are similar to system configuration baselines with the exception that they only refer to settings for specific applications.
What is configuration baseline ITIL?
configuration baseline ( ITIL Service Transition ) The baseline of a configuration that has been formally agreed and is managed through the change management process. configuration item (CI) ( ITIL Service Transition ) Any component or other service asset that needs to be managed in order to deliver an IT service.
Which of the following describes a configuration baseline quizlet?
Which of the following describes a configuration baseline? A list of common security settings that a group or all devices share. You have recently experienced a security incident with one of your servers.
Which of the following is an example of rule based access control?
Examples of Rules Based Access Control include situations such as permitting access for an account or group to a network connection at certain hours of the day or days of the week. As with MAC, access control cannot be changed by users. All access permissions are controlled solely by the system administrator.
Which of the following networking devices or services prevents in most cases the use of IPsec as a VPN tunneling protocol?
confidentiality. Which of the following networking devices or services prevents the use of IPsec in most cases? firewalls, routers, and switches. A group of salesmen in your organization would like to access your private network through the internet while they are traveling.
Which of the following reduce the risk of a threat agent being able to exploit?
A countermeasure is a means of mitigating a potential risk. Countermeasures reduce the risk of a threat agent exploiting a vulnerability.
What is multi layer access control?
Multi-layered security refers to a security system that uses numerous components to shield multiple levels or operational layers. The term can also refer to the term “defensive depth,” which is based on slightly different ideas, many of which are used to mitigate threats, delay or prevent threats.
What is a layered security controls approach called?
The best defense is a layered security architecture that recognizes both the strengths and limitations of various security products. Also known as defense in depth, layered security places multiple security controls throughout the IT environment.
What is layered security approach?
Definition: A layered cybersecurity approach involves using several different components in your strategy so that every aspect of your defense is backed up by another, should something go wrong.
Which of the following is used in GUI?
The main pieces of a GUI are a pointer, icons, windows, menus, scroll bars, and an intuitive input device. Some common GUIs are the ones associated with Microsoft Windows, Mac OSX, Chrome OS, GNOME, KDE, and Android.
Which operating system does not use GUI?
Early command line operating systems like MS-DOS and even some versions of Linux today has no GUI interface.
What device is used to work with graphical objects in a GUI?
Human interface devices, for the efficient interaction with a GUI include a computer keyboard, especially used together with keyboard shortcuts, pointing devices for the cursor (or rather pointer) control: mouse, pointing stick, touchpad, trackball, joystick, virtual keyboards, and head-up displays (translucent.