
MOC II 0 VII IV IV
Authored by Griffen Dawe
Computers
Professional Development
Used 1+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
91 questions
Show all answers
1.
MULTIPLE SELECT QUESTION
45 sec • 3 pts
What are the key target resources for attackers? Select 3 options from the following.
Domain Controller
Email servers
Database servers
DHCP servers
DNS servers
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
True / False. A server can have only one JEA endpoints
True
False
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
One of the tools used to determine which applications are configured to start automatically when a computer boots up or user sign on. Select from the following.
Accesschk
Autorun
Sysmon
LogonSession
4.
MULTIPLE SELECT QUESTION
45 sec • 2 pts
Select 2 Attack against application from the following:
SQL Injection
Adware
Distributed operating system
Distributed denial of service
Spyware
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
PAM process is implemented through temporary group membership
True
False
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
GMSA requires this following key
Public key
Private Key
KDS root key
7.
MULTIPLE SELECT QUESTION
45 sec • 2 pts
Select two statements for principles of least privilege from the knowledge you gain from this course.
Use a single over privileged account
Only use privileged accounts to perform administrative tasks
Use administrator account to perform administrative task
Avoid single over privileged account
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?