Answered step by step
Verified Expert Solution
Question
1 Approved Answer
Describe what a technical control is. What is the C-I-A triad? Describe what physical control is. What is the difference between a client system and
- Describe what a technical control is.
- What is the C-I-A triad?
- Describe what physical control is.
- What is the difference between a client system and a server system?
- Describe what Discretionary access control (DAC) is
- What is the difference between user mode and supervisor mode?
- Describe what multilayered defense is.
- What are some of the benefits of Active Directory?
- What does the KDC in Active Directory do?
- In Windows Active Directory what is Dynamic Access Control (DAC)?
- How does Microsoft Windows calculate permissions?
- What rights do you have with the full control permission?
- How are digital certificates used when using PKI?
- How do you protect data at rest?
- How do you protect data in transit?
- When working with PKI what does the public key of a trusted entity allow you to do?
- What are some common types of malware?
- Describe what a zero-day attack is.
- What is a resource to use when developing a malware eradication plan?
- Describe what Ransomware is.
- What are the two nodes in the Local Group Policy Editor?
- What document guides you define the group policy settings?
- Describe how security filters work with group policies?
- How do group policies apply to computers that are offline?
- Describe what profiling is.
- What features does the Security Configuration and Analysis (SCA) tool have?
- What are the parts of a security audit?
- What is a good tool to check if there is gaps from the security policy for your computers?
- Describe what Recovery time objective (RTO) is.
- What can cause data loss in an organization?
- Describe what Microsoft Hyper-V is.
- What would happen if you changed your backups from once a day to every other day? Would it effect the restoring of data?
- Describe what is meant by connection media.
- Describe what a Campus area network is.
- What is a NAS?
- What ports would a web server use?
- Describe what due diligence is.
- What can an Intrusion prevention system (IPS) do for your organization?
- Describe what Active Directory is.
- To use Microsoft Windows Server Backup utility on a server what must you do?
- Describe what a role is on a Microsoft Server.
- What protocol uses port 80?
- Describe what RADIUS is.
- Describe what Public key infrastructure (PKI) is.
- Describe what a Man-in-the-Middle attack is.
- Describe what a web server command is.
- When talking about computers what is a zombie?
- What are some different things you can do to protect your database server?
- Describe what real evidence is.
- Describe what a computer security incident response team (CSIRT) does.
- Who would be the members of computer security incident response team (CSIRT)?
- Describe what best evidence rule is.
- What is a deliverable when working with software development?
- What is meant by agile development?
- Describe what a schema is.
- Describe what Software configuration management (SCM) is.
- What is social engineering?
- What are good things to do when you audit computers?
- What is a good policy for Windows updates?
- How would you use security templates when baselining computers?
Step by Step Solution
★★★★★
3.51 Rating (158 Votes )
There are 3 Steps involved in it
Step: 1
1 Technical Control Technical controls are security measures implemented through technology to manage monitor and protect access to information systems and data These controls include authentication m...Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started