100% tevredenheidsgarantie Direct beschikbaar na je betaling Lees online óf als PDF Geen vaste maandelijkse kosten 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

Enterprise System Administration Review Questions with complete Solutions Rated A+

Beoordeling
-
Verkocht
-
Pagina's
10
Cijfer
A+
Geüpload op
11-10-2024
Geschreven in
2024/2025

Enterprise System Administration Review Questions with complete Solutions Rated A+ Regulatory framework compliance will require organizations to comply with security regulations - Answers True Regulatory framework compliance is comprised of procedures, practices, guidelines, standards and policy - Answers True An Enterprise consists of hardware and software infrastructure, organizations, policy, operations, internal and external networks, internal devices, production environments and is structured on business architecture, information architecture, data architecture, applications architecture and employees - Answers True Disaster recovery for an enterprise enterprise is for scalability measures - Answers False RAID stands for - Answers Redundant Array of Independent Disks The CIA is an initialization for - Answers C- Confidentiality I- Integrity A- Availability FQDN represents ? - Answers Fully Qualified Domain Name and it represents the domain name of a network System backups are not necessary in an enterprise environment - Answers False Job tasks for a system admin includes - Answers 1. Monthly patching of the system 2. Designing the system architecture 3. Capacity planning and system lifecycle management Three main components of a network in an Enterprise are - Answers Hardware Software Protocols A proxy server (load balancer) could be used to allow for high availability of web servers - Answers True Powershell is monitoring software on the Linux platform used for authentication - Answers False What is the reasoning behind the notion of swap space - Answers To allow an extension of RAM on a computing platform What is the use of a GPO? - Answers Group Policy Object is used to set Windows group policy in Enterprise computing What is used to authenticate users in an Enterprise environment? - Answers An Active Directory An organizational unit (OU) is a container that holds groups of users and computers in an Enterprise - Answers True The NIST SP800- 128 is about the minimum security requirements for Federal Information Systems. (Cyber Security Requirements) - Answers False How does communication work in a client server architecture ? - Answers A server listens on a specific port and listens for incoming requests from clients What is a protocol ? - Answers A common language between entities (eg. HTTPS) There is a maximum of a 10,000 ports available for protocols on a system NIC - Answers False What are the 3 critical identifiers for the TCP network communications - Answers IP address MAC address Ports System and Information Security implies that - Answers We identify, report, and correct information and information system flaws in a timely manner, provide protection from malicious code at appropriate locations within the organizational information systems and monitor information system security alerts and advisories and take appropriate actions in response What is the function of System and Communications Protection (SC) - Answers To monitor, control and protect organization communications What is Risk Assessment - Answers assessing risks to organization operations, assets and individuals. Personnell Security (PS) - Answers Make sure individuals with responsibility are trust worthy Maintenance - Answers must establish timely maintenance on systems such as patching Incident Response (IR) - Answers incident handling with preparation, detection analysis, containment and recovery Configuration Management - Answers baseline configuration, inventory, and performing maintenance on systems. Access Control (AC) - Answers The management of authorized users access to the information systems NIST SP800- 53 - Answers This document covers the security control structure for information systems

Meer zien Lees minder
Instelling
System Administration
Vak
System Administration









Oeps! We kunnen je document nu niet laden. Probeer het nog eens of neem contact op met support.

Geschreven voor

Instelling
System Administration
Vak
System Administration

Documentinformatie

Geüpload op
11 oktober 2024
Aantal pagina's
10
Geschreven in
2024/2025
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

Voorbeeld van de inhoud

Enterprise System Administration Review Questions with complete Solutions Rated A+

Regulatory framework compliance will require organizations to comply with security regulations -
Answers True

Regulatory framework compliance is comprised of procedures, practices, guidelines, standards and
policy - Answers True

An Enterprise consists of hardware and software infrastructure, organizations, policy, operations,
internal and external networks, internal devices, production environments and is structured on business
architecture, information architecture, data architecture, applications architecture and employees -
Answers True

Disaster recovery for an enterprise enterprise is for scalability measures - Answers False

RAID stands for - Answers Redundant Array of Independent Disks

The CIA is an initialization for - Answers C- Confidentiality I- Integrity A- Availability

FQDN represents ? - Answers Fully Qualified Domain Name and it represents the domain name of a
network

System backups are not necessary in an enterprise environment - Answers False

Job tasks for a system admin includes - Answers 1. Monthly patching of the system

2. Designing the system architecture

3. Capacity planning and system lifecycle management

Three main components of a network in an Enterprise are - Answers Hardware

Software

Protocols

A proxy server (load balancer) could be used to allow for high availability of web servers - Answers True

Powershell is monitoring software on the Linux platform used for authentication - Answers False

What is the reasoning behind the notion of swap space - Answers To allow an extension of RAM on a
computing platform

What is the use of a GPO? - Answers Group Policy Object is used to set Windows group policy in
Enterprise computing

What is used to authenticate users in an Enterprise environment? - Answers An Active Directory

, An organizational unit (OU) is a container that holds groups of users and computers in an Enterprise -
Answers True

The NIST SP800- 128 is about the minimum security requirements for Federal Information Systems.
(Cyber Security Requirements) - Answers False

How does communication work in a client server architecture ? - Answers A server listens on a specific
port and listens for incoming requests from clients

What is a protocol ? - Answers A common language between entities (eg. HTTPS)

There is a maximum of a 10,000 ports available for protocols on a system NIC - Answers False

What are the 3 critical identifiers for the TCP network communications - Answers IP address

MAC address

Ports

System and Information Security implies that - Answers We identify, report, and correct information and
information system flaws in a timely manner, provide protection from malicious code at appropriate
locations within the organizational information systems and monitor information system security alerts
and advisories and take appropriate actions in response

What is the function of System and Communications Protection (SC) - Answers To monitor, control and
protect organization communications

What is Risk Assessment - Answers assessing risks to organization operations, assets and individuals.

Personnell Security (PS) - Answers Make sure individuals with responsibility are trust worthy

Maintenance - Answers must establish timely maintenance on systems such as patching

Incident Response (IR) - Answers incident handling with preparation, detection analysis, containment
and recovery

Configuration Management - Answers baseline configuration, inventory, and performing maintenance
on systems.

Access Control (AC) - Answers The management of authorized users access to the information systems

NIST SP800- 53 - Answers This document covers the security control structure for information systems

Awareness and Training - Answers Security training of employees meets this criteria for federal systems

Audit and Accountability - Answers the auditing of systems require monitoring to detect unlawful access

SSH - Answers An encrypted protocol used in communications on the network

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
TutorJosh Chamberlain College Of Nursing
Bekijk profiel
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
361
Lid sinds
1 jaar
Aantal volgers
16
Documenten
29332
Laatst verkocht
7 uur geleden
Tutor Joshua

Here You will find all Documents and Package Deals Offered By Tutor Joshua.

3.6

56 beoordelingen

5
19
4
15
3
12
2
0
1
10

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via Bancontact, iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo eenvoudig kan het zijn.”

Alisha Student

Veelgestelde vragen