Selected Answer instituting chances for employees to gather new skills which

Selected answer instituting chances for employees to

This preview shows page 12 - 15 out of 15 pages.

Selected Answer: instituting chances for employees to gather new skills, which can foster enhanced job satisfaction Correct Answer: instituting chances for employees to gather new skills, which can foster enhanced job satisfaction Question 43 2 out of 2 points A ________________ is a technological term used in security policy to describe a future state in which specific goals and objectives have been achieved and which processes, resources, and tools are needed to achieve those goals and objectives.
Image of page 12
Selected Answer: target state Correct Answer: target state Question 44 0 out of 2 points Microsoft domains offer _______________ in order to enhance security for certain departments or users in an organization. This method allows security gaps to close and security settings to be increased for some computers or users. Selected Answer: configuration management policies Correct Answer: group policy Question 45 0 out of 2 points In order to assess policy compliance, many organizations will use a report card. The evaluation tools are comprised of criteria based on an organization’s requirements. Which of the following is not one the elements that would be included on a report card? Selected Answer: security settings Correct Answer: number of random audits performed Question 46 2 out of 2 points The window of ________________ is the time between when an opportunity for risk is identified and when the risk is ultimately eliminated by a patch. Selected Answer: vulnerabil ity Correct Answer: vulnerabil ity Question 47 0 out of 2 points There are a number of automated tools created by Microsoft that can be
Image of page 13
used to verify compliance. Once such tool is the ____________________, which is a free download that locates system vulnerabilities by sending queries. This tool can scan multiple systems in a network and maintain a history of reports for all prior scans. Selected Answer: Nessus Correct Answer: Microsoft Baseline Security Analyzer (MBSA) Question 48 0 out of 2 points There are several different best practices available for implementation when creating a plan for IT security policy compliance monitoring. One such practice is to design a baseline derived from the security policy, which entails _________________. Selected Answer: using a security policy document as a blueprint Correct Answer: using images when feasible in the implementation of new operating systems Question 49 2 out of 2 points A __________________________ is a term that refers to the original image that is duplicated for deployment. Using this image saves times by eradicating the need for repeated changes to configuration and tweaks to performance. Selected Answer: gold master Correct Answer: gold master Question 50 0 out of 2 points In order to ensure compliance, organizations deploy both new and current technologies. Which of the following is not one these new technologies? Selected Answer: COSO Internal Compliance Framework Correct Answer:
Image of page 14
Common Platform Enumeration (CPE)
Image of page 15

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture