Answered step by step
Verified Expert Solution
Question
1 Approved Answer
1. A best practice is to use meaningful names for Group Policy Objects (GPOs) to make maintenance and administration easier. True False 2. For Group
1. A best practice is to use meaningful names for Group Policy Objects (GPOs) to make maintenance and administration easier.
True
False
2. For Group Policy settings stored in the Windows Registry, which of the following should be used to modify the Group Policy Object (GPO) data?
Always use the Local Group Policy Editor.
Use the Local Group Policy Editor Registry Editor. Use the Registry Editor only as a last resort.
Use the Registry Editor. Use the Local Group Policy editor only as a last resort.
Always use the Registry Editor.
pts
3. An audit is an evaluation of a collection of one or more objects.
True
False
ts
4. Part of a Windows audit includes collecting configuration and performance information.
True
False
pts
5.Which of the following is a hardware-based solution to protect computers from certain types of data loss?
Redundant array of independent disks (RAID)
Volume Shadow Copy Service (VSS)
Hyper-V
Virtualization
pts
6.A disadvantage of backing up files and folders to a network consumes network resources.
True
False
pts
7.A router can connect any types of networks as long as they use the same protocols.
True
False
pts
8.Richard is responsible for ensuring network availability for the organization. In order to overcome a network availability problem, he recently switched from using coaxial cable to shielded twisted pair (STP) cabling. What does Richard believe was the original problem?
Future network runs were expected to be longer.
The network was experiencing interference.
Future network installation was expected to be too challenging.
The network speed was too slow.
pts
9.In the Windows Firewall with Advanced Security MMC snap-in, which of the following involve IPSec?
Outbound rules
Connection security rules
Inbound rules
Monitorin
1
10. You use encryption, user accounts, and access control lists (ACLs). However, you find that there is no plan to replace database server hardware if it fails. You find that ordering a replacement server would take at least 24 hours to arrive, and an additional 6 hours to prepare for use. Which part of the C-I-A security triad has failed?
Maintaining confidentiality
Maintaining integrity
None
Maintaining availability
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started