- Home
- Server Administration
- Comptia
- Server+
56.
Which of the following statements is false with respect to safes?
- A.All safes are fireproof.
- B.United Laboratories (UL) assigns ratings to safes that you can use to assess the suitability of the safe.
- C.Those that are fire resistant will protect a document from being destroyed.
- D.When considering a safe, you should focus on two items: the ease with which the safe can be compromised and the ability of the safe to withstand a fire.
- Answer & Explanation
- Report
Answer : [A]
Explanation :
Explanation :
With respect to fire, first understand that no safe is fireproof. Many are fire resistant and will protect a document from being destroyed, which occurs at a much higher temperature than many of the other items (such as backup tapes and CDs) can tolerate without damage. For these reasons, items such as backup tapes should be stored offsite. |
57.
Which of the following is a physical hardening technique?
- A.Stopping unneeded services
- B.Closing unneeded ports
- C.Installing only required software
- D.Assigning a BIOS password
- Answer & Explanation
- Report
Answer : [D]
Explanation :
Explanation :
Assigning a BIOS password is considered a physical hardening technique. |
58.
When discussing security, which of the following is defined as any point of entry into the
network?
- A.Access point
- B.Endpoint
- C.Drop point
- D.Access link
- Answer & Explanation
- Report
Answer : [B]
Explanation :
Explanation :
When discussing network security, an endpoint is any point of entry into the network. A typical example of an endpoint is a laptop connected to the network with a remote access connection. Therefore, the process of providing endpoint security is the process of ensuring that every endpoint (including servers) has been secured in the same way in which you would secure the network gateway. |
59.
Which of the following is not true of an HIDS?
- A.A high number of false positives can cause a lax attitude on the part of the security team.
- B.An HIDS cannot address authentication issues.
- C.Encrypted packets cannot be analyzed.
- D.An HIDS monitors all traffic that goes through it looking for signs of attack on any machine in the network.
- Answer & Explanation
- Report
Answer : [D]
Explanation :
Explanation :
A host-based system is installed on the device (for purposes of our discussion, a server) and the system focuses solely on identifying attacks on that device only. This is in contrast to a network-based system, which monitors all traffic that goes through it looking for signs of attack on any machine in the network. |
60.
Which of the following is a vulnerability scanner for Windows only?
- A.MBSA
- B.Nessus
- C.NIDS
- D.Tripwire
- Answer & Explanation
- Report
Answer : [A]
Explanation :
Explanation :
For your Windows servers, an excellent tool is the Microsoft Baseline Security Analyzer (MBSA). This tool can identify missing security patches, weak passwords and other security issues that are specific to installed products. |