100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

ITSY 1300 CHAPTER 5-8 TEST QUESTIONS & ANSWERS

Rating
4.0
(1)
Sold
-
Pages
6
Grade
A+
Uploaded on
17-09-2025
Written in
2025/2026

ITSY 1300 CHAPTER 5-8 TEST QUESTIONS & ANSWERS

Institution
ITSY 1300
Course
ITSY 1300









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
ITSY 1300
Course
ITSY 1300

Document information

Uploaded on
September 17, 2025
Number of pages
6
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

ITSY 1300 CHAPTER 5-8 TEST QUESTIONS &
ANSWERS

Which part of the CIA triad refers to preventing the disclosure of secure information to
unauthorized individuals or systems? - Answer -Confidentiality

Which part of the CIA triad refers to making sure information is obtainable when
needed? - Answer -Availability

Which part of the CIA triad refers to maintaining and assuring the accuracy of data over
its life-cycle? - Answer -Integrity

Which of the following combines something you know (e.g. password) with something
you are (e.g. fingerprint) or something you possess (e.g. USB stick) and can also
employ a certificate system that adds a distinct third layer to the authentication process?
- Answer -Two-factor authentication

Microsoft Windows Active Directory provides capabilities in all three of the CIA areas,
and the domain administrator will be called upon to implement: - Answer -The roles of
Confidentiality and Integrity most frequently

Members of the ____________ group called Remote Desktop Users are allowed to use
the remote desktop services to connect to remote machines. - Answer -Builtin (built-in)

If it is impractical to place guest users in a secure network, isolated from the production
network by firewall barriers, then: - Answer -Specific areas of access should be
determined and they should be as restrictive as possible.

Which of the following statements is true regarding guest users who require a higher
degree of access? - Answer -These guest users can be issued local, self-signed
certificates that expire on a specific date and limit the guest's access.

By default, Windows will: - Answer -Inherit the permissions of the parent folder so that
all subfolders will have the same permissions as the parent.

From the LabFiles Properties dialog box, which of the following options is necessary to
enable you to specify permissions for each subfolder? - Answer -Disable inheritance

On a Windows network share, if the user can add, edit and delete files and folders
within the LabFiles folder, what type of access controls and permissions are probably
configured? - Answer -Modify

, On a Windows network share, if the user can view the folder's contents as well as
execute scripts, what type of access controls and permissions are probably configured?
- Answer -Read and execute

On a Windows network share, if the user can browse a file but cannot copy or modify it,
what type of access controls and permissions are probably configured? - Answer -List
folder contents

Which of the following tools is used to modify permissions on the TargetWindowsDC01
server to allow new users to use the remote desktop services? - Answer -The Group
Policy Object Editor

Windows Group Policy can be used _____________ to control access to many local
computer and network resources such as drives, Internet access, kiosk mode, etc. -
Answer -on either a local or domain level

Which of the following is the mechanism on a Windows server where you can
administer granular policies and permissions on a Windows network using role-based
access? - Answer -Windows Group Policy

Janet is identifying the set of privileges that should be assigned to a new employee in
her organization. Which phase of the access control process is she performing? -
Answer -Authorization

Which of the following would NOT be considered in the scope of organizational
compliance efforts? - Answer -Laws

Biyu is making arrangements to use a third-party service provider for security services.
She wants to document a requirement for timely notification of security breaches. What
type of agreement is most likely to contain formal requirements of this type. - Answer -
Service level agreement (SLA)

By creating users, assigning those users to groups, and then applying groups to
resources in the domain, the administrator sets up both authentication using the Active
Directory Domain authentication policies, and builds a series of nested ___________ to
control the access to domain resources. - Answer -Access Control Lists

Makes the process of accessing machines that are not on the domain much easier. -
Answer -Active Directory

Which of the following is the database that provides a centrally controlled and managed
access and security management system for an organization's Windows computer
systems? - Answer -Active Directory

Which of the following statements is true regarding the rules for password selection? -
Answer -Change your passwords frequently

Reviews from verified buyers

Showing all reviews
2 months ago

4.0

1 reviews

5
0
4
1
3
0
2
0
1
0
Trustworthy reviews on Stuvia

All reviews are made by real Stuvia users after verified purchases.

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
GEEKA YALA UNIVERSITY
View profile
Follow You need to be logged in order to follow users or courses
Sold
2000
Member since
3 year
Number of followers
1444
Documents
46990
Last sold
2 days ago

3.8

342 reviews

5
170
4
61
3
44
2
16
1
51

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions