a)The chief information security officer has requested information about a recent regional breach that affected many companies, including yours. Which of the following would be the least helpful threat intelligence source to use to investigate?   a. Threat maps     b. Dark web     c. File and code repositories     d. Vulnerability databases

Microsoft Windows 10 Comprehensive 2019
1st Edition
ISBN:9780357392607
Author:FREUND
Publisher:FREUND
Chapter5: Advanced Personalization And Customization
Section: Chapter Questions
Problem 1AYK
icon
Related questions
Question

a)The chief information security officer has requested information about a recent regional breach that affected many companies, including yours. Which of the following would be the least helpful threat intelligence source to use to investigate?

  a. Threat maps  
  b. Dark web  
  c. File and code repositories  
  d. Vulnerability databases  

 

 

b)Moe is trying to add a new operating system to a personal computer. He was able to install Linux in the free space available on the hard drive and adjust the boot loader so that he can select an operating system when booting. However, when he tries to boot to Linux, the system will not allow it. He has determined that boot security is stopping him. Which of the following is the most likely reason for this?

  a. Secure Boot does not have the proper information to allow the system to boot.  
  b. The computer is using a legacy BIOS boot.  
  c. Measured Boot cannot access the server to assess the security.  
  d. The computer is using UEFI Native Mode.

 

 

c)Your security team is hardening the workstation operating system in your organization. Which of the following is not a task they would complete while hardening?

  a. Close unneeded ports.  
  b. Disable the guest account.  
  c. Install a Host Intrusion Detection System (HIDS).  
  d. Reduce the number of tasks that a user can complete on the OS. 
Expert Solution
trending now

Trending now

This is a popular solution!

steps

Step by step

Solved in 4 steps

Blurred answer
Knowledge Booster
Primary components of process planning
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Similar questions
  • SEE MORE QUESTIONS
Recommended textbooks for you
Microsoft Windows 10 Comprehensive 2019
Microsoft Windows 10 Comprehensive 2019
Computer Science
ISBN:
9780357392607
Author:
FREUND
Publisher:
Cengage
A+ Guide To It Technical Support
A+ Guide To It Technical Support
Computer Science
ISBN:
9780357108291
Author:
ANDREWS, Jean.
Publisher:
Cengage,
Management Of Information Security
Management Of Information Security
Computer Science
ISBN:
9781337405713
Author:
WHITMAN, Michael.
Publisher:
Cengage Learning,
Systems Architecture
Systems Architecture
Computer Science
ISBN:
9781305080195
Author:
Stephen D. Burd
Publisher:
Cengage Learning