97%(39)38 out of 39 people found this document helpful
This preview shows page 3 - 6 out of 6 pages.
1.A certificate authority refers to the original image that is duplicated for deployment. Using this image saves times by eradicating the need for repeated changes to configuration and tweaks to performance.TrueFalse5 points QUESTION 131.Although there are security tasks that can achieved with specific tools, any tasks concerning IT security policy compliance need to address one basicconcern: change and configuration management. This management is important because changes made to the system and enhancing configurations each affect the life cycle of a system.5 points QUESTION 141.As part of the National Institute of Standards and Technology (NIST) program, the Security Content Automation Protocol (SCAP) identifies standards and protocol implemented to establish a range of different automated compliance tools and scanners. One of the different tools available is the ______________________, which deploys a privileged account to authenticate on the target system, and it eventually scans the system to ascertain compliance with an identified set of configuration requirements.5 points QUESTION 151.Consider this scenario: A sales organization with an onsite IT staff experiences a major outage due to a minor change to a printer. Though systems were working successfully, the printer stopped working when a new server was added to the network. The new server that was added to the network shared the same IP address as the printer. Which of the following statements captures a contributing cause of the problem with the IP compatibility?