100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4,6 TrustPilot
logo-home
Examen

Enterprise System Administration Review Questions with complete Solutions Rated A+

Puntuación
-
Vendido
-
Páginas
10
Grado
A+
Subido en
11-10-2024
Escrito en
2024/2025

Enterprise System Administration Review Questions with complete Solutions Rated A+ Regulatory framework compliance will require organizations to comply with security regulations - Answers True Regulatory framework compliance is comprised of procedures, practices, guidelines, standards and policy - Answers True An Enterprise consists of hardware and software infrastructure, organizations, policy, operations, internal and external networks, internal devices, production environments and is structured on business architecture, information architecture, data architecture, applications architecture and employees - Answers True Disaster recovery for an enterprise enterprise is for scalability measures - Answers False RAID stands for - Answers Redundant Array of Independent Disks The CIA is an initialization for - Answers C- Confidentiality I- Integrity A- Availability FQDN represents ? - Answers Fully Qualified Domain Name and it represents the domain name of a network System backups are not necessary in an enterprise environment - Answers False Job tasks for a system admin includes - Answers 1. Monthly patching of the system 2. Designing the system architecture 3. Capacity planning and system lifecycle management Three main components of a network in an Enterprise are - Answers Hardware Software Protocols A proxy server (load balancer) could be used to allow for high availability of web servers - Answers True Powershell is monitoring software on the Linux platform used for authentication - Answers False What is the reasoning behind the notion of swap space - Answers To allow an extension of RAM on a computing platform What is the use of a GPO? - Answers Group Policy Object is used to set Windows group policy in Enterprise computing What is used to authenticate users in an Enterprise environment? - Answers An Active Directory An organizational unit (OU) is a container that holds groups of users and computers in an Enterprise - Answers True The NIST SP800- 128 is about the minimum security requirements for Federal Information Systems. (Cyber Security Requirements) - Answers False How does communication work in a client server architecture ? - Answers A server listens on a specific port and listens for incoming requests from clients What is a protocol ? - Answers A common language between entities (eg. HTTPS) There is a maximum of a 10,000 ports available for protocols on a system NIC - Answers False What are the 3 critical identifiers for the TCP network communications - Answers IP address MAC address Ports System and Information Security implies that - Answers We identify, report, and correct information and information system flaws in a timely manner, provide protection from malicious code at appropriate locations within the organizational information systems and monitor information system security alerts and advisories and take appropriate actions in response What is the function of System and Communications Protection (SC) - Answers To monitor, control and protect organization communications What is Risk Assessment - Answers assessing risks to organization operations, assets and individuals. Personnell Security (PS) - Answers Make sure individuals with responsibility are trust worthy Maintenance - Answers must establish timely maintenance on systems such as patching Incident Response (IR) - Answers incident handling with preparation, detection analysis, containment and recovery Configuration Management - Answers baseline configuration, inventory, and performing maintenance on systems. Access Control (AC) - Answers The management of authorized users access to the information systems NIST SP800- 53 - Answers This document covers the security control structure for information systems

Mostrar más Leer menos
Institución
System Administration
Grado
System Administration









Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Escuela, estudio y materia

Institución
System Administration
Grado
System Administration

Información del documento

Subido en
11 de octubre de 2024
Número de páginas
10
Escrito en
2024/2025
Tipo
Examen
Contiene
Preguntas y respuestas

Temas

Vista previa del contenido

Enterprise System Administration Review Questions with complete Solutions Rated A+

Regulatory framework compliance will require organizations to comply with security regulations -
Answers True

Regulatory framework compliance is comprised of procedures, practices, guidelines, standards and
policy - Answers True

An Enterprise consists of hardware and software infrastructure, organizations, policy, operations,
internal and external networks, internal devices, production environments and is structured on business
architecture, information architecture, data architecture, applications architecture and employees -
Answers True

Disaster recovery for an enterprise enterprise is for scalability measures - Answers False

RAID stands for - Answers Redundant Array of Independent Disks

The CIA is an initialization for - Answers C- Confidentiality I- Integrity A- Availability

FQDN represents ? - Answers Fully Qualified Domain Name and it represents the domain name of a
network

System backups are not necessary in an enterprise environment - Answers False

Job tasks for a system admin includes - Answers 1. Monthly patching of the system

2. Designing the system architecture

3. Capacity planning and system lifecycle management

Three main components of a network in an Enterprise are - Answers Hardware

Software

Protocols

A proxy server (load balancer) could be used to allow for high availability of web servers - Answers True

Powershell is monitoring software on the Linux platform used for authentication - Answers False

What is the reasoning behind the notion of swap space - Answers To allow an extension of RAM on a
computing platform

What is the use of a GPO? - Answers Group Policy Object is used to set Windows group policy in
Enterprise computing

What is used to authenticate users in an Enterprise environment? - Answers An Active Directory

, An organizational unit (OU) is a container that holds groups of users and computers in an Enterprise -
Answers True

The NIST SP800- 128 is about the minimum security requirements for Federal Information Systems.
(Cyber Security Requirements) - Answers False

How does communication work in a client server architecture ? - Answers A server listens on a specific
port and listens for incoming requests from clients

What is a protocol ? - Answers A common language between entities (eg. HTTPS)

There is a maximum of a 10,000 ports available for protocols on a system NIC - Answers False

What are the 3 critical identifiers for the TCP network communications - Answers IP address

MAC address

Ports

System and Information Security implies that - Answers We identify, report, and correct information and
information system flaws in a timely manner, provide protection from malicious code at appropriate
locations within the organizational information systems and monitor information system security alerts
and advisories and take appropriate actions in response

What is the function of System and Communications Protection (SC) - Answers To monitor, control and
protect organization communications

What is Risk Assessment - Answers assessing risks to organization operations, assets and individuals.

Personnell Security (PS) - Answers Make sure individuals with responsibility are trust worthy

Maintenance - Answers must establish timely maintenance on systems such as patching

Incident Response (IR) - Answers incident handling with preparation, detection analysis, containment
and recovery

Configuration Management - Answers baseline configuration, inventory, and performing maintenance
on systems.

Access Control (AC) - Answers The management of authorized users access to the information systems

NIST SP800- 53 - Answers This document covers the security control structure for information systems

Awareness and Training - Answers Security training of employees meets this criteria for federal systems

Audit and Accountability - Answers the auditing of systems require monitoring to detect unlawful access

SSH - Answers An encrypted protocol used in communications on the network
$8.99
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada


Documento también disponible en un lote

Conoce al vendedor

Seller avatar
Los indicadores de reputación están sujetos a la cantidad de artículos vendidos por una tarifa y las reseñas que ha recibido por esos documentos. Hay tres niveles: Bronce, Plata y Oro. Cuanto mayor reputación, más podrás confiar en la calidad del trabajo del vendedor.
TutorJosh Chamberlain College Of Nursing
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
361
Miembro desde
1 año
Número de seguidores
16
Documentos
29332
Última venta
7 horas hace
Tutor Joshua

Here You will find all Documents and Package Deals Offered By Tutor Joshua.

3.6

56 reseñas

5
19
4
15
3
12
2
0
1
10

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes