100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

Enterprise System Administration Review Questions with complete Solutions Rated A+

Rating
-
Sold
-
Pages
10
Grade
A+
Uploaded on
11-10-2024
Written in
2024/2025

Enterprise System Administration Review Questions with complete Solutions Rated A+ Regulatory framework compliance will require organizations to comply with security regulations - Answers True Regulatory framework compliance is comprised of procedures, practices, guidelines, standards and policy - Answers True An Enterprise consists of hardware and software infrastructure, organizations, policy, operations, internal and external networks, internal devices, production environments and is structured on business architecture, information architecture, data architecture, applications architecture and employees - Answers True Disaster recovery for an enterprise enterprise is for scalability measures - Answers False RAID stands for - Answers Redundant Array of Independent Disks The CIA is an initialization for - Answers C- Confidentiality I- Integrity A- Availability FQDN represents ? - Answers Fully Qualified Domain Name and it represents the domain name of a network System backups are not necessary in an enterprise environment - Answers False Job tasks for a system admin includes - Answers 1. Monthly patching of the system 2. Designing the system architecture 3. Capacity planning and system lifecycle management Three main components of a network in an Enterprise are - Answers Hardware Software Protocols A proxy server (load balancer) could be used to allow for high availability of web servers - Answers True Powershell is monitoring software on the Linux platform used for authentication - Answers False What is the reasoning behind the notion of swap space - Answers To allow an extension of RAM on a computing platform What is the use of a GPO? - Answers Group Policy Object is used to set Windows group policy in Enterprise computing What is used to authenticate users in an Enterprise environment? - Answers An Active Directory An organizational unit (OU) is a container that holds groups of users and computers in an Enterprise - Answers True The NIST SP800- 128 is about the minimum security requirements for Federal Information Systems. (Cyber Security Requirements) - Answers False How does communication work in a client server architecture ? - Answers A server listens on a specific port and listens for incoming requests from clients What is a protocol ? - Answers A common language between entities (eg. HTTPS) There is a maximum of a 10,000 ports available for protocols on a system NIC - Answers False What are the 3 critical identifiers for the TCP network communications - Answers IP address MAC address Ports System and Information Security implies that - Answers We identify, report, and correct information and information system flaws in a timely manner, provide protection from malicious code at appropriate locations within the organizational information systems and monitor information system security alerts and advisories and take appropriate actions in response What is the function of System and Communications Protection (SC) - Answers To monitor, control and protect organization communications What is Risk Assessment - Answers assessing risks to organization operations, assets and individuals. Personnell Security (PS) - Answers Make sure individuals with responsibility are trust worthy Maintenance - Answers must establish timely maintenance on systems such as patching Incident Response (IR) - Answers incident handling with preparation, detection analysis, containment and recovery Configuration Management - Answers baseline configuration, inventory, and performing maintenance on systems. Access Control (AC) - Answers The management of authorized users access to the information systems NIST SP800- 53 - Answers This document covers the security control structure for information systems

Show more Read less
Institution
System Administration
Course
System Administration









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
System Administration
Course
System Administration

Document information

Uploaded on
October 11, 2024
Number of pages
10
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

Enterprise System Administration Review Questions with complete Solutions Rated A+

Regulatory framework compliance will require organizations to comply with security regulations -
Answers True

Regulatory framework compliance is comprised of procedures, practices, guidelines, standards and
policy - Answers True

An Enterprise consists of hardware and software infrastructure, organizations, policy, operations,
internal and external networks, internal devices, production environments and is structured on business
architecture, information architecture, data architecture, applications architecture and employees -
Answers True

Disaster recovery for an enterprise enterprise is for scalability measures - Answers False

RAID stands for - Answers Redundant Array of Independent Disks

The CIA is an initialization for - Answers C- Confidentiality I- Integrity A- Availability

FQDN represents ? - Answers Fully Qualified Domain Name and it represents the domain name of a
network

System backups are not necessary in an enterprise environment - Answers False

Job tasks for a system admin includes - Answers 1. Monthly patching of the system

2. Designing the system architecture

3. Capacity planning and system lifecycle management

Three main components of a network in an Enterprise are - Answers Hardware

Software

Protocols

A proxy server (load balancer) could be used to allow for high availability of web servers - Answers True

Powershell is monitoring software on the Linux platform used for authentication - Answers False

What is the reasoning behind the notion of swap space - Answers To allow an extension of RAM on a
computing platform

What is the use of a GPO? - Answers Group Policy Object is used to set Windows group policy in
Enterprise computing

What is used to authenticate users in an Enterprise environment? - Answers An Active Directory

, An organizational unit (OU) is a container that holds groups of users and computers in an Enterprise -
Answers True

The NIST SP800- 128 is about the minimum security requirements for Federal Information Systems.
(Cyber Security Requirements) - Answers False

How does communication work in a client server architecture ? - Answers A server listens on a specific
port and listens for incoming requests from clients

What is a protocol ? - Answers A common language between entities (eg. HTTPS)

There is a maximum of a 10,000 ports available for protocols on a system NIC - Answers False

What are the 3 critical identifiers for the TCP network communications - Answers IP address

MAC address

Ports

System and Information Security implies that - Answers We identify, report, and correct information and
information system flaws in a timely manner, provide protection from malicious code at appropriate
locations within the organizational information systems and monitor information system security alerts
and advisories and take appropriate actions in response

What is the function of System and Communications Protection (SC) - Answers To monitor, control and
protect organization communications

What is Risk Assessment - Answers assessing risks to organization operations, assets and individuals.

Personnell Security (PS) - Answers Make sure individuals with responsibility are trust worthy

Maintenance - Answers must establish timely maintenance on systems such as patching

Incident Response (IR) - Answers incident handling with preparation, detection analysis, containment
and recovery

Configuration Management - Answers baseline configuration, inventory, and performing maintenance
on systems.

Access Control (AC) - Answers The management of authorized users access to the information systems

NIST SP800- 53 - Answers This document covers the security control structure for information systems

Awareness and Training - Answers Security training of employees meets this criteria for federal systems

Audit and Accountability - Answers the auditing of systems require monitoring to detect unlawful access

SSH - Answers An encrypted protocol used in communications on the network

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
TutorJosh Chamberlain College Of Nursing
View profile
Follow You need to be logged in order to follow users or courses
Sold
361
Member since
1 year
Number of followers
16
Documents
29332
Last sold
5 hours ago
Tutor Joshua

Here You will find all Documents and Package Deals Offered By Tutor Joshua.

3.6

56 reviews

5
19
4
15
3
12
2
0
1
10

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions