100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
CIST 2601 PRACTICE EXAM REVIEW Questions with 100- Accurately Answer Latest Updates 2024 TOP $9.49   Add to cart

Exam (elaborations)

CIST 2601 PRACTICE EXAM REVIEW Questions with 100- Accurately Answer Latest Updates 2024 TOP

 7 views  0 purchase
  • Course
  • CIST 1601 Ch04
  • Institution
  • CIST 1601 Ch04

CIST 2601 PRACTICE EXAM REVIEW Questions with 100- Accurately Answer Latest Updates 2024 TOP

Preview 2 out of 12  pages

  • August 13, 2024
  • 12
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • CIST 1601 Ch04
  • CIST 1601 Ch04
avatar-seller
TUTOR007
CIST 2601 PRACTICE EXAM REVIEW Questions
with 100% Accurately Answer Latest Updates
2024 TOP GRADED
Approximately what percentage of computers use the Windows operating system? correct
answers 90

Which encryption method is not automatically enabled with the operating system and must be
enabled after installation? correct answers BitLocker in Windows Server 2008 R2

What acronym describes each entry in a DACL? correct answers ACE

____________________ is an approach to securing an IT environment that uses a collection of
strategies. correct answers Defense in depth

The ______________ is the collection of all computers and network devices connected to one or
more networks that make up an IT environment. correct answers IT infrastructure

What is the older Windows authentication method that was popular before Kerberos? correct
answers NTLM

Why is encryption used as a common security control? correct answers Encryption provides an
effective layer of protection in a multi-layered defense.

What is the primary benefit of using kernel loadable modules? correct answers The primary
benefit of using Kernel Loadable modules is that the kernel is less Memory intensive. As a
secondary benefit, loading only the modules that you will be using to the kernel decreases the
attack surface by not loading modules that will not be used.

Which Microsoft Server 2008 R2 edition is a cost-effective, entry-level server operating system
for small businesses? correct answers Foundation

Which structure does Windows use to store access control rules for objects? correct answers
Access Control List

Which level of EFS may leave traces of unencrypted data on the disk? correct answers File

Which core part of an operating system provides essential services? correct answers Kernel

Which operating system is the ancestor of today's Microsoft Windows? correct answers DOS

, In which process would a user be asked to enter a token-generated password? correct answers
Authorization

Which default Windows group provides only limited administrative rights, including the ability
to install software? correct answers Power Users

Which of the following well-known attacks used a worm to exploit vulnerabilities in Microsoft
Internet Information Services (IIS) starting in July of 2001? correct answers Code Red

Which authentication method uses data object classification labels? correct answers Mandatory
Access Control

What does a client need to access a protected resource when using the Kerberos protocol? correct
answers Access ticket

Which of the following actions allow an attacker to access restricted parts of the operating
system? correct answers Change a user mode process to supervisor mode.

The ability to run a backup is an example of which Windows feature? correct answers Right

____________ is the common name of the United States Department of Defense Trusted
Computer System Evaluation Criteria. correct answers Orange Book

Which element in a PKI infrastructure authorizes a client to request a certificate? correct answers
RA

Which run mode allows processes to access more restricted parts of a computer system? correct
answers Supervisor

Which Windows feature prompts users before escalating to administrator privileges? correct
answers UAC

Which security tenet ensures that only authorized users can modify information? correct answers
Integrity

What Windows feature makes encrypting removable media easy? correct answers BitLocker To
Go

Which security tenet of the A-I-C triad does a successful DoS attack compromise? correct
answers Availability

Which of the following best defines an ACL? correct answers List of access permissions

Encrypting File System (EFS) supports which file system(s)? correct answers NTFS

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller TUTOR007. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $9.49. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

79271 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$9.49
  • (0)
  Add to cart