96%(403)386 out of 403 people found this document helpful
This preview shows page 12 - 15 out of 15 pages.
Selected Answer:instituting chances for employees to gather new skills, which can foster enhanced job satisfactionCorrect Answer:instituting chances for employees to gather new skills, which can foster enhanced job satisfactionQuestion 432 out of 2 pointsA ________________ is a technological term used in security policy to describe a future state in which specific goals and objectives have been achieved and which processes, resources, and tools are needed to achievethose goals and objectives.
Selected Answer:target stateCorrect Answer:target stateQuestion 440 out of 2 pointsMicrosoft domains offer _______________ in order to enhance security for certain departments or users in an organization. This method allows security gaps to close and security settings to be increased for some computers or users.Selected Answer:configuration management policiesCorrect Answer:group policyQuestion 450 out of 2 pointsIn order to assess policy compliance, many organizations will use a report card. The evaluation tools are comprised of criteria based on an organization’s requirements. Which of the following is not one the elements that would be included on a report card?Selected Answer:security settingsCorrect Answer:number of random audits performedQuestion 462 out of 2 pointsThe window of ________________ is the time between when an opportunity for risk is identified and when the risk is ultimately eliminated by a patch.Selected Answer:vulnerabilityCorrect Answer:vulnerabilityQuestion 470 out of 2 pointsThere are a number of automated tools created by Microsoft that can be
used to verify compliance. Once such tool is the ____________________, which is a free download that locates system vulnerabilities by sending queries. This tool can scan multiple systems in a network and maintain a history of reports for all prior scans.Selected Answer:NessusCorrect Answer:Microsoft Baseline Security Analyzer (MBSA)Question 480 out of 2 pointsThere are several different best practices available for implementation when creating a plan for IT security policy compliance monitoring. One such practice is to design a baseline derived from the security policy, which entails _________________.Selected Answer:using a security policy document as a blueprintCorrect Answer:using images when feasible in the implementation of new operating systemsQuestion 492 out of 2 pointsA __________________________ is a term that refers to the original image thatis duplicated for deployment. Using this image saves times by eradicating the need for repeated changes to configuration and tweaks to performance.Selected Answer:gold masterCorrect Answer:gold masterQuestion 500 out of 2 pointsIn order to ensure compliance, organizations deploy both new and current technologies. Which of the following is notone these new technologies?Selected Answer:COSO Internal Compliance FrameworkCorrect Answer: