Enterprise System Administration Review Questions with complete Solutions Rated A+
6 views 0 purchase
Course
System Administration
Institution
System Administration
Enterprise System Administration Review Questions with complete Solutions Rated A+
Regulatory framework compliance will require organizations to comply with security regulations - Answers True
Regulatory framework compliance is comprised of procedures, practices, guidelines, standards and policy ...
Enterprise System Administration Review Questions with complete Solutions Rated A+
Regulatory framework compliance will require organizations to comply with security regulations -
Answers True
Regulatory framework compliance is comprised of procedures, practices, guidelines, standards and
policy - Answers True
An Enterprise consists of hardware and software infrastructure, organizations, policy, operations,
internal and external networks, internal devices, production environments and is structured on business
architecture, information architecture, data architecture, applications architecture and employees -
Answers True
Disaster recovery for an enterprise enterprise is for scalability measures - Answers False
RAID stands for - Answers Redundant Array of Independent Disks
The CIA is an initialization for - Answers C- Confidentiality I- Integrity A- Availability
FQDN represents ? - Answers Fully Qualified Domain Name and it represents the domain name of a
network
System backups are not necessary in an enterprise environment - Answers False
Job tasks for a system admin includes - Answers 1. Monthly patching of the system
2. Designing the system architecture
3. Capacity planning and system lifecycle management
Three main components of a network in an Enterprise are - Answers Hardware
Software
Protocols
A proxy server (load balancer) could be used to allow for high availability of web servers - Answers True
Powershell is monitoring software on the Linux platform used for authentication - Answers False
What is the reasoning behind the notion of swap space - Answers To allow an extension of RAM on a
computing platform
What is the use of a GPO? - Answers Group Policy Object is used to set Windows group policy in
Enterprise computing
What is used to authenticate users in an Enterprise environment? - Answers An Active Directory
, An organizational unit (OU) is a container that holds groups of users and computers in an Enterprise -
Answers True
The NIST SP800- 128 is about the minimum security requirements for Federal Information Systems.
(Cyber Security Requirements) - Answers False
How does communication work in a client server architecture ? - Answers A server listens on a specific
port and listens for incoming requests from clients
What is a protocol ? - Answers A common language between entities (eg. HTTPS)
There is a maximum of a 10,000 ports available for protocols on a system NIC - Answers False
What are the 3 critical identifiers for the TCP network communications - Answers IP address
MAC address
Ports
System and Information Security implies that - Answers We identify, report, and correct information and
information system flaws in a timely manner, provide protection from malicious code at appropriate
locations within the organizational information systems and monitor information system security alerts
and advisories and take appropriate actions in response
What is the function of System and Communications Protection (SC) - Answers To monitor, control and
protect organization communications
What is Risk Assessment - Answers assessing risks to organization operations, assets and individuals.
Personnell Security (PS) - Answers Make sure individuals with responsibility are trust worthy
Maintenance - Answers must establish timely maintenance on systems such as patching
Incident Response (IR) - Answers incident handling with preparation, detection analysis, containment
and recovery
Configuration Management - Answers baseline configuration, inventory, and performing maintenance
on systems.
Access Control (AC) - Answers The management of authorized users access to the information systems
NIST SP800- 53 - Answers This document covers the security control structure for information systems
Awareness and Training - Answers Security training of employees meets this criteria for federal systems
Audit and Accountability - Answers the auditing of systems require monitoring to detect unlawful access
SSH - Answers An encrypted protocol used in communications on the network
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller TutorJosh. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $8.49. You're not tied to anything after your purchase.