Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Describe what a technical control is. What is the C-I-A triad? Describe what physical control is. What is the difference between a client system and



  1. Describe what a technical control is.
  2. What is the C-I-A triad?
  3. Describe what physical control is.
  4. What is the difference between a client system and a server system?
  5. Describe what Discretionary access control (DAC) is
  6. What is the difference between user mode and supervisor mode?
  7. Describe what multilayered defense is.
  8. What are some of the benefits of Active Directory?
  9. What does the KDC in Active Directory do?
  10. In Windows Active Directory what is Dynamic Access Control (DAC)?
  11. How does Microsoft Windows calculate permissions?
  12. What rights do you have with the full control permission?
  13. How are digital certificates used when using PKI?
  14. How do you protect data at rest?
  15. How do you protect data in transit?
  16. When working with PKI what does the public key of a trusted entity allow you to do?
  17. What are some common types of malware?
  18. Describe what a zero-day attack is.
  19. What is a resource to use when developing a malware eradication plan?
  20. Describe what Ransomware is.
  21. What are the two nodes in the Local Group Policy Editor?
  22. What document guides you define the group policy settings?
  23. Describe how security filters work with group policies?
  24. How do group policies apply to computers that are offline?
  25. Describe what profiling is.
  26. What features does the Security Configuration and Analysis (SCA) tool have?
  27. What are the parts of a security audit?
  28. What is a good tool to check if there is gaps from the security policy for your computers?
  29. Describe what Recovery time objective (RTO) is.
  30. What can cause data loss in an organization?
  31. Describe what Microsoft Hyper-V is.
  32. What would happen if you changed your backups from once a day to every other day? Would it effect the restoring of data?
  33. Describe what is meant by connection media.
  34. Describe what a Campus area network is.
  35. What is a NAS?
  36. What ports would a web server use?
  37. Describe what due diligence is.
  38. What can an Intrusion prevention system (IPS) do for your organization?
  39. Describe what Active Directory is.
  40. To use Microsoft Windows Server Backup utility on a server what must you do?
  41. Describe what a role is on a Microsoft Server.
  42. What protocol uses port 80?
  43. Describe what RADIUS is.
  44. Describe what Public key infrastructure (PKI) is.
  45. Describe what a Man-in-the-Middle attack is.
  46. Describe what a web server command is.
  47. When talking about computers what is a zombie?
  48. What are some different things you can do to protect your database server?
  49. Describe what real evidence is.
  50. Describe what a computer security incident response team (CSIRT) does.
  51. Who would be the members of computer security incident response team (CSIRT)?
  52. Describe what best evidence rule is.
  53. What is a deliverable when working with software development?
  54. What is meant by agile development?
  55. Describe what a schema is.
  56. Describe what Software configuration management (SCM) is.
  57. What is social engineering?
  58. What are good things to do when you audit computers?
  59. What is a good policy for Windows updates?
  60. How would you use security templates when baselining computers?


Step by Step Solution

3.51 Rating (158 Votes )

There are 3 Steps involved in it

Step: 1

1 Technical Control Technical controls are security measures implemented through technology to manage monitor and protect access to information systems and data These controls include authentication m... blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image_2

Step: 3

blur-text-image_3

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Modern Systems Analysis And Design

Authors: Joe Valacich, Joey George

9th Global Edition

1292351624, 978-1292351629

More Books

Students also viewed these Computer Network questions

Question

13. What is the relationship between orexin and narcolepsy?

Answered: 1 week ago

Question

10. Why do most antihistamines make people drowsy?

Answered: 1 week ago