100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4.2 TrustPilot
logo-home
Examen

CIST 2601 Final Exam Gwinnett Technical College (Need Test 4) Questions and Correct Answers. Accurate 2025 Exam. Graded A+.

Puntuación
-
Vendido
-
Páginas
18
Grado
A+
Subido en
31-07-2025
Escrito en
2024/2025

CIST 2601: Implementing Operating System Security CIST 2601 Final Exam Gwinnett Technical College (Need Test 4) Questions and Correct Answers. Accurate 2025 Exam. Graded A+. Approximately what percentage of computers use the Windows operating system? - ANS >> 90 Which encryption method is not automatically enabled with the operating system and must be enabled after installation? - ANS >> BitLocker in Windows Server 2008 R2 What acronym describes each entry in a DACL? - ANS >> ACE ____________________ is an approach to securing an IT environment that uses a collection of strategies. - ANS >> Defense in depth The ______________ is the collection of all computers and network devices connected to one or more networks that make up an IT environment. - ANS >> IT infrastructure What is the older Windows authentication method that was popular before Kerberos? - ANS >> NTLM Why is encryption used as a common security control? - ANS >> Encryption provides an effective layer of protection in a multi-layered defense. What is the primary benefit of using kernel loadable modules? - ANS >> The primary benefit of using Kernel Loadable modules is that the kernel is less Memory intensive. As a secondary benefit, loading only the modules that you will be using to the kernel decreases the attack surface by not loading modules that will not be used. CIST 2601: Implementing Operating System Security Which Microsoft Server 2008 R2 edition is a cost-effective, entry-level server operating system for small businesses? - ANS >> Foundation Which structure does Windows use to store access control rules for objects? - ANS >> Access Control List Which level of EFS may leave traces of unencrypted data on the disk? - ANS >> File Which core part of an operating system provides essential services? - ANS >> Kernel Which operating system is the ancestor of today's Microsoft Windows? - ANS >> DOS In which process would a user be asked to enter a token-generated password? - ANS >> Authorization Which default Windows group provides only limited administrative rights, including the ability to install software? - ANS >> Power Users Which of the following well-known attacks used a worm to exploit vulnerabilities in Microsoft Internet Information Services (IIS) starting in July of 2001? - ANS >> Code Red Which authentication method uses data object classification labels? - ANS >> Mandatory Access Control What does a client need to access a protected resource when using the Kerberos protocol? - ANS >> Access ticket CIST 2601: Implementing Operating System Security Which of the following actions allow an attacker to access restricted parts of the operating system? - ANS >> Change a user mode process to supervisor mode. The ability to run a backup is an example of which Windows feature? - ANS >> Right ____________ is the common name of the United States Department of Defense Trusted Computer System Evaluation Criteria. - ANS >> Orange Book Which element in a PKI infrastructure authorizes a client to request a certificate? - ANS >> RA Which run mode allows processes to access more restricted parts of a computer system? - ANS >> Supervisor

Mostrar más Leer menos
Institución
Grado










Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Escuela, estudio y materia

Institución
Grado

Información del documento

Subido en
31 de julio de 2025
Número de páginas
18
Escrito en
2024/2025
Tipo
Examen
Contiene
Preguntas y respuestas

Temas

Vista previa del contenido

CIST 2601: Implementing Operating System Security


CIST 2601 Final Exam Gwinnett Technical
College (Need Test 4) Questions and Correct
Answers. Accurate 2025 Exam. Graded A+.

Approximately what percentage of computers use the Windows operating
system? - ANS >> 90


Which encryption method is not automatically enabled with the operating system
and must be enabled after installation? - ANS >> BitLocker in Windows Server
2008 R2


What acronym describes each entry in a DACL? - ANS >> ACE


____________________ is an approach to securing an IT environment that uses a
collection of strategies. - ANS >> Defense in depth


The ______________ is the collection of all computers and network devices
connected to one or more networks that make up an IT environment. - ANS >> IT
infrastructure


What is the older Windows authentication method that was popular before
Kerberos? - ANS >> NTLM


Why is encryption used as a common security control? - ANS >> Encryption
provides an effective layer of protection in a multi-layered defense.


What is the primary benefit of using kernel loadable modules? - ANS >> The
primary benefit of using Kernel Loadable modules is that the kernel is less
Memory intensive. As a secondary benefit, loading only the modules that you will
be using to the kernel decreases the attack surface by not loading modules that
will not be used.

,CIST 2601: Implementing Operating System Security




Which Microsoft Server 2008 R2 edition is a cost-effective, entry-level server
operating system for small businesses? - ANS >> Foundation


Which structure does Windows use to store access control rules for objects? -
ANS >> Access Control List


Which level of EFS may leave traces of unencrypted data on the disk? - ANS >>
File


Which core part of an operating system provides essential services? - ANS >>
Kernel


Which operating system is the ancestor of today's Microsoft Windows? - ANS >>
DOS


In which process would a user be asked to enter a token-generated password? -
ANS >> Authorization


Which default Windows group provides only limited administrative rights,
including the ability to install software? - ANS >> Power Users


Which of the following well-known attacks used a worm to exploit vulnerabilities
in Microsoft Internet Information Services (IIS) starting in July of 2001? - ANS >>
Code Red


Which authentication method uses data object classification labels? - ANS >>
Mandatory Access Control


What does a client need to access a protected resource when using the
Kerberos protocol? - ANS >> Access ticket

, CIST 2601: Implementing Operating System Security


Which of the following actions allow an attacker to access restricted parts of the
operating system? - ANS >> Change a user mode process to supervisor mode.


The ability to run a backup is an example of which Windows feature? - ANS >>
Right


____________ is the common name of the United States Department of Defense
Trusted Computer System Evaluation Criteria. - ANS >> Orange Book


Which element in a PKI infrastructure authorizes a client to request a
certificate? - ANS >> RA




Which run mode allows processes to access more restricted parts of a
computer system? - ANS >> Supervisor


Which Windows feature prompts users before escalating to administrator
privileges? - ANS >> UAC


Which security tenet ensures that only authorized users can modify information?
- ANS >> Integrity


What Windows feature makes encrypting removable media easy? - ANS >>
BitLocker To Go


Which security tenet of the A-I-C triad does a successful DoS attack
compromise? - ANS >> Availability


Which of the following best defines an ACL? - ANS >> List of access permissions


Encrypting File System (EFS) supports which file system(s)? - ANS >> NTFS
$12.99
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada

Conoce al vendedor

Seller avatar
Los indicadores de reputación están sujetos a la cantidad de artículos vendidos por una tarifa y las reseñas que ha recibido por esos documentos. Hay tres niveles: Bronce, Plata y Oro. Cuanto mayor reputación, más podrás confiar en la calidad del trabajo del vendedor.
Nurslink Chamberlain College Of Nursing
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
219
Miembro desde
2 año
Número de seguidores
72
Documentos
1673
Última venta
1 semana hace
Nurslink.

Pre-eminent study guidance.

3.4

23 reseñas

5
8
4
6
3
3
2
0
1
6

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes