Search Header Logo

MOC II 0 VII IV IV

Authored by Griffen Dawe

Computers

Professional Development

Used 1+ times

MOC II 0 VII IV IV
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

91 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

45 sec • 3 pts

What are the key target resources for attackers? Select 3 options from the following.

Domain Controller

Email servers


Database servers

DHCP servers

DNS servers

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

True / False. A server can have only one JEA endpoints

True

False

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

One of the tools used to determine which applications are configured to start automatically when a computer boots up or user sign on. Select from the following.

Accesschk

Autorun

Sysmon

LogonSession

4.

MULTIPLE SELECT QUESTION

45 sec • 2 pts

Select 2 Attack against application from the following:

SQL Injection

Adware

Distributed operating system

Distributed denial of service

Spyware

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

PAM process is implemented through temporary group membership

True

False

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

GMSA requires this following key

Public key 

Private Key

KDS root key

7.

MULTIPLE SELECT QUESTION

45 sec • 2 pts

Select two statements for principles of least privilege from the knowledge you gain from this course. 

Use a single over privileged account 

Only use privileged accounts to perform administrative tasks 

Use administrator account to perform administrative task 

Avoid single over privileged account 

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?