Preview

Windows 7 Study guide

Satisfactory Essays
Open Document
Open Document
563 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Windows 7 Study guide
CompTIA Security+ SY0-301 Study Kit http://www.ecertified.org

QUESTION NO: 434
Which of the following can Pete, a security administrator, use to distribute the processing effort when generating hashes for a password cracking program?
A. RAID
B. Clustering
C. Redundancy
D. Virtualization
Answer: B
Explanation:
QUESTION NO: 435
An offsite location containing the necessary hardware without data redundancy would be an example of which of the following off-site contingency plans?
A. Cluster B.
Cold site C.
Warm site D.
Hot site
Answer: C
Explanation:
QUESTION NO: 436
Which of the following should Jane, a security administrator, perform before a hard drive is analyzed with forensics tools?
A. Identify user habits
B. Disconnect system from network
C. Capture system image
D. Interview witnesses
Answer: C
Explanation:
QUESTION NO: 437
Which of the following is BEST described as a scenario where organizational management decides not to provide a service offering because it presents an unacceptable risk to the organization? CompTIA Security+ SY0-301 Study Kit http://www.ecertified.org
A. Mitigation
B. Acceptance
C. Deterrence
D. Avoidance
Answer: D
Explanation:
QUESTION NO: 438
Which of the following is the primary security reason why Pete, a security administrator, should block social networking sites in a large corporation?
A. The proxy server needs to be specially configured for all social networking sites.
B. The data traffic can cause system strain and can overwhelm the firewall rule sets.
C. The users' work productivity decreases greatly.
D. The users can unintentionally post sensitive company information.
Answer: D
Explanation:
QUESTION NO: 439
Which of the following describes the importance of enacting and maintaining a clean desk policy?
A. To ensure that data is kept on encrypted network shares
B. To avoid passwords and sensitive data from being unsecured
C. To verify that users are utilizing data storage

You May Also Find These Documents Helpful

  • Satisfactory Essays

    a. It is highly recommended that you only use this account when there are tasks that require root privileges such as moving files or directories into or out of system directories.…

    • 368 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    After careful consideration, it was decided by the corporate IT team that in order to increase security and…

    • 235 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    It255 Final Study Guide

    • 843 Words
    • 4 Pages

    17. Which of the following is not a part of an ordinary IT security policy framework?…

    • 843 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    Unit 5 Problem Set 1

    • 522 Words
    • 3 Pages

    2. Which of the following mechanisms is most often used in firewall rules to allow traffic…

    • 522 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 7 Assignment 2

    • 208 Words
    • 1 Page

    All tasks should be a part of this phase. It is important to plan and have proper access controls, anti-virus, up to date patches and software, and backups of the network…

    • 208 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Lab 7

    • 928 Words
    • 3 Pages

    a. Placing a firewall between two routers and another firewall before a DMZ would be the best requirement choice to use…

    • 928 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    It530

    • 681 Words
    • 3 Pages

    position of a system administrator considering hiring a hacker. How would you ensure that this…

    • 681 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    marketing principles

    • 8471 Words
    • 34 Pages

    1) Of the following successful marketing strategies in the past, today 's Nike has learned that the most important is ________.…

    • 8471 Words
    • 34 Pages
    Satisfactory Essays
  • Best Essays

    Although the health risk condition is fulfilled the presence of imminent risk cannot be justified.…

    • 2048 Words
    • 9 Pages
    Best Essays
  • Satisfactory Essays

    To establish and maintain a safe, healthy learning environment I model safety practices and healthy routines in an environment that supports development and growth in these areas. My goal is to provide a clean healthy environment that meets each child’s physical needs. Making sure the classroom and playground are clean and safe at all times reduces the number of injuries of children while they are in my care. One of the ways I do this is by supervising children at all times. Making sure all outlets are covered so children can’t access them. I make sure inside as well as outside there is nothing children can harm themselves on such as sharp objects or small items they can choke on. I ensure that all chemicals and cleaning supplies are put away out of the reach of children or stored in locked cabinets. To establish and maintain a healthy environment is to prevent the spread of germs and promote healthy eating habits. Germs can be easily spread among the age group of children. One of the ways I promote a healthy environment is hand washing. I wash my hands and wear gloves before and after handling food, helping with toileting, changing diapers and cleaning noses. I have the children wash their hands during similar times and ensure that they do it properly. Cleaning and sanitizing play areas daily and mouthed toys are immediately removed from the play area and sanitized at the end of the day.…

    • 391 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Clean Desk Policy

    • 491 Words
    • 2 Pages

    2. It reduces the threat of security, as passwords and confidential information get locked away;…

    • 491 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Which of the following organizations would be least likely to have a company objective involving the maximization of shareholder value?…

    • 1513 Words
    • 7 Pages
    Good Essays
  • Good Essays

    1. Compare the prefetching scheme with spooling where the CPU overlaps the input of one job with the computation and of other jobs.…

    • 698 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Risk Control Matrix

    • 607 Words
    • 3 Pages

    • Establish clear policies that dictate to employees and customers what information should be posted as part of the enterprise social media presence.…

    • 607 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Our lifestyles have undergone a sea change with the advancement in technology especially in the field of computers. Computers are an integral part of our lifestyles today and are found at offices, homes, schools, colleges, hotels, shops etc. This advance in technology has made our lives easy and comfortable. For instance, we can execute a number of activities using computer based systems- we can write a draft on word processor and email it, make calculations using an electronic spreadsheet and incorporate graphics, create a database of friends with their phone numbers, addresses and e-mail ids etc. It is an arduous process to perform these activities using existing traditional methods. Computers can also simplify other tasks such as word processing, designing, web site development, database management etc. Therefore, a computer should be referred to as a ‘Data processor’.…

    • 7034 Words
    • 24 Pages
    Powerful Essays