What do you use to run the security configuration and analysis (sca) tool on the command-line?

  • School San Jacinto Community College
  • Course Title ITSY 2300
  • Pages 14

This preview shows page 2 - 6 out of 14 pages.

Answer:Recognizing and discarding configuration or performance informationchanges

Answers:A.Verifying that security controls comply with the security policyB.Recognizing and discarding configuration or performance informationchangesC.Collecting configuration and performance informationD.Creating initial and subsequent baselinesResponseFeedback:Category:UnderstandDifficulty:MediumExplanation:Recognizing and analyzing configuration or performanceinformation changes is part of a Windows security audit, not recognizing anddiscarding.Reference:CH07, Microsoft Windows Security AuditType:Multiple ChoiceQuestion 85 out of 5 pointsOf the following Microsoft Windows Security Audits best practices, which one is the firstlogical step?Answers:

Get answer to your question and much more

Question 95 out of 5 pointsWhat do you use to run the Security Configuration and Analysis (SCA) tool on thecommand-line?Answers:

Get answer to your question and much more

B.A PowerShell windowC.Nothing; SCA cannot be run on the command-lineD.A command promptResponseFeedback:Category:UnderstandDifficulty:EasyExplanation:The SCA command-line tool can be used to profile a Windowscomputer by opening a PowerShell window.Reference:CH07, Microsoft Baseline Security Analyzer (MBSA)Type:Multiple ChoiceQuestion 105 out of 5 pointsDevin needs to assess the security configuration on several Windows Server 2016 systems.Most important for Devin is to identify the particular gaps on each system against a knownstandard. Of the following tools useful for auditing a system's security settings, whichwould be most favorable for Devin?Answers:

Get answer to your question and much more

Question 111 out of 1 pointsThe Burp Suite scanner enables you to scan web servers for vulnerabilities that are specificto web applications.Answers:SelectedAnswer:TrueTrueFalse

ResponseFeedback:Reference:CH07, Burp Suite Web Vulnerability ScannerType:True/FalseQuestion 121 out of 1 pointsProfiling allows you to compare snapshots, or baselines, of systems over time.

Get answer to your question and much more

ResponseFeedback:Reference:CH07, ProfilingType:True/FalseQuestion 135 out of 5 pointsWhich of the following is true about Microsoft Baseline Security Analyzer (MBSA)?

Get answer to your question and much more

Upload your study docs or become a

Course Hero member to access this document

Upload your study docs or become a

Course Hero member to access this document

End of preview. Want to read all 14 pages?

Upload your study docs or become a

Course Hero member to access this document

Tags

Windows 2000, Windows XP, MS DOS

  • School California State University, Los Angeles
  • Course Title CIS MISC
  • Pages 6
  • Ratings 100% (2) 2 out of 2 people found this document helpful

This preview shows page 1 - 3 out of 6 pages.

Chapter 7Multiple Choice Questions1.Which of the following is a collection of security-related configuration settingson a computer?1.Security Configuration and Analysis (SCA)2.Security template3.Profile4.Security baseline

2.Which of the following is true about Microsoft Baseline Security Analyzer(MBSA)?

Get answer to your question and much more

3.In general, which of the following is the term used for extracting informationabout someone or something based on known attributes?

Get answer to your question and much more

4.Which of the following is true about the Security Configuration and Analysis(SCA) tool?

Get answer to your question and much more

5.Which of the following store settings that make up baselines?1.Security templates2.ReadMe files3.Kerberos policy4.Audit templates

Upload your study docs or become a

Course Hero member to access this document

Upload your study docs or become a

Course Hero member to access this document

End of preview. Want to read all 6 pages?

Upload your study docs or become a

Course Hero member to access this document

Tags

Windows 2000, Windows XP

Which of the following is true about the security configuration and Analysis tool?

Which of the following is true about the Security Configuration and Analysis (SCA) tool? It can apply a baseline to force current computer settings to match the settings defined in the baseline.

What is the security configuration and Analysis snap in used for?

The Security Configuration and Analysis is a stand-alone snap-in tool that users can use to import one or more saved configurations to a private security database. Importing configurations builds a machine-specific security database that stores a composite configuration.

What advantage is there to using security configuration and analysis?

The advantage of the Security Configuration and Analysis tool is that it provides analysis capabilities to determine cumulative affects from new policies.

Which of the following is defined as any action that dramatically slows down or blocks access to one or more resources?

Which of the following is defined as any action that dramatically slows down or blocks access to one or more resources? Denial of service (DoS) attack. Which of the following is the Windows Server 2019 edition designed for large-scale deployment on servers that support extensive virtualization?