Exam 11: Securing and Maintaining an Operating System

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A host firewall creates a barrier between networks so potentially harmful packets can't enter or leave the networks that are being protected.

(True/False)
4.8/5
(36)

You have been experiencing disk space shortages on your Windows 10 computer periodically and you have had to manually find and delete old temporary and downloaded files. You want this task to occur automatically. What is the fastest approach to meet this requirement?

(Multiple Choice)
4.8/5
(25)

You have installed an application on a Linux computer that receives connection-oriented Transport layer segments on port 444 and sends datagrams on port 555. Which two commands should you use to configure the firewall?

(Multiple Choice)
4.8/5
(28)

Which of the following is NOT a guideline of a security policy?

(Multiple Choice)
5.0/5
(35)

Which of the following is a true statement about rotating backup media?

(Multiple Choice)
4.8/5
(37)

Which command should you use on a Linux system to find and print a list of files that begin with acctg that have been modified in the last 10 days?

(Multiple Choice)
4.8/5
(35)

Which of the following is true about a host firewall?

(Multiple Choice)
4.8/5
(33)

Under what circumstance should you always let Windows manage the paging file size when running Windows Server 2012 and newer?

(Multiple Choice)
4.9/5
(38)

Which of the following is NOT a network category for determining the Windows Defender Firewall profile applied?

(Multiple Choice)
4.9/5
(33)

Which of the following is a partial backup that backs up files that have changed since the last full or incremental backup?

(Multiple Choice)
4.9/5
(31)

You are configuring a network in which remote access clients will access the network using different entry points such as through Wifi and VPN. You need a convenient authentication system to handle this. Which of the following is a good choice?

(Multiple Choice)
4.8/5
(32)

You are testing a new client server application and the application doesn't appear to be communicating successfully between the client and server. All network configuration settings have been verified but since the application is new, you are unsure of all the protocols that are used. What is a good first step in troubleshooting the problem?

(Multiple Choice)
4.8/5
(40)

Which backup type backs up the disk sector by sector?

(Multiple Choice)
4.9/5
(39)

Which of the following is NOT a credential category for multifactor authentication?

(Multiple Choice)
4.9/5
(39)

You need to configure two servers to use IPsec for secure communication. You will use an authentication method that involves a public entity. What type of authentication will you use?

(Multiple Choice)
4.8/5
(34)

What command-line utility can you use in Linux to monitor paging?

(Multiple Choice)
4.9/5
(28)

What firewall rule in Windows Defender with Advanced Security should you configure to block the connection if you don't want the computer to receive ping packets initiated by another computer?

(Multiple Choice)
4.9/5
(32)

Which of the following is true about Windows Defender Firewall?

(Multiple Choice)
4.9/5
(23)

Which of the following is NOT a facet of securing data on a computer?

(Multiple Choice)
4.8/5
(35)

You have shared a folder on a Windows server and set permissions. What do you need to do next to ensure users can access the share.

(Multiple Choice)
4.9/5
(39)
Showing 21 - 40 of 46
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)