SlideShare a Scribd company logo
1 of 3
Download to read offline
1. An SA has no access to sensitive information by default.
True
False
2. Dynamic network configuration allows central management of network infrastructure.
True
False
3. Virtual networks can provide security between virtual servers.
True
False
4. When debugging, you should find the state of the service/system.
True
False
5. A service monitor should be able to determine if the service is responding correctly.
True
False
6. A name space can be used to storage usernames.
True
False
7. A demilitarized zone should have total access to the Internet.
True
False
8. Changes should be managed by a process, so changes need a minimum amount of approval, to
protect operations.
True
False
9. An open architecture means that a service is not proprietary.
True
False
10 Prior to release, antivirus software should be centrally managed and updates should be
quickly reviewed.
True
False
11 When a computer is ready to be deployed, it should be done and ready to work.
True
False
12 Even though it may be difficult, shared passwords must be changed immediately when
terminating an SA.
True
False
13 Email is made up of several open standards.
True
False
14 A change request should include nontechnical and technical details.
True
False
15 When gathering requirements, it is important to know what will be used to perform an action
not only the protocol or how.
True
False
1- An SA has no access to sensitive information by default- True False.pdf

More Related Content

Similar to 1- An SA has no access to sensitive information by default- True False.pdf

APManagement_FeatureGuide
APManagement_FeatureGuideAPManagement_FeatureGuide
APManagement_FeatureGuideEugene Yu
 
The Cloud Is NOT Just Someone Else's Computer
The Cloud Is NOT Just Someone Else's ComputerThe Cloud Is NOT Just Someone Else's Computer
The Cloud Is NOT Just Someone Else's ComputerJames Cupps
 
Microservices and Kubernetes for your Full Data Lifecycle
Microservices and Kubernetes for your Full Data LifecycleMicroservices and Kubernetes for your Full Data Lifecycle
Microservices and Kubernetes for your Full Data LifecycleDoKC
 
Survey Presentation About Application Security
Survey Presentation About Application SecuritySurvey Presentation About Application Security
Survey Presentation About Application SecurityNicholas Davis
 
Top IT Management Practices for Government Entities
Top IT Management Practices for Government EntitiesTop IT Management Practices for Government Entities
Top IT Management Practices for Government EntitiesSolarWinds
 
Part 1You have been recently hired as a network security analyst.docx
Part 1You have been recently hired as a network security analyst.docxPart 1You have been recently hired as a network security analyst.docx
Part 1You have been recently hired as a network security analyst.docxdanhaley45372
 
10 questions to ask your cloud provider
10 questions to ask your cloud provider10 questions to ask your cloud provider
10 questions to ask your cloud providerHighQ
 
Client Server Network Security
Client Server Network SecurityClient Server Network Security
Client Server Network SecurityMithilDoshi1
 
How to Boost Your Magento Store Security?
How to Boost Your Magento Store Security?How to Boost Your Magento Store Security?
How to Boost Your Magento Store Security?Bryan Walters
 
Top 9 Critical Findings - Dramatically Improve Your Organization's Security
Top 9 Critical Findings - Dramatically Improve Your Organization's SecurityTop 9 Critical Findings - Dramatically Improve Your Organization's Security
Top 9 Critical Findings - Dramatically Improve Your Organization's SecurityPraetorian
 
SQL Server 2012 Security Task
SQL Server 2012 Security TaskSQL Server 2012 Security Task
SQL Server 2012 Security TaskYaakub Idris
 
Troubleshooting Urouter Problems: WebEx Presentation
Troubleshooting Urouter Problems: WebEx PresentationTroubleshooting Urouter Problems: WebEx Presentation
Troubleshooting Urouter Problems: WebEx PresentationUniface
 
IRJET- Attribute based Access Control for Cloud Data Storage
IRJET- Attribute based Access Control for Cloud Data StorageIRJET- Attribute based Access Control for Cloud Data Storage
IRJET- Attribute based Access Control for Cloud Data StorageIRJET Journal
 
CP PLUS Camera Manual
CP PLUS Camera ManualCP PLUS Camera Manual
CP PLUS Camera Manualgolu4567
 
3_Lesson-1_MAINTENANCE_maintaining .pptx
3_Lesson-1_MAINTENANCE_maintaining .pptx3_Lesson-1_MAINTENANCE_maintaining .pptx
3_Lesson-1_MAINTENANCE_maintaining .pptxpujanteclementmarcus
 
Chapter 4Secure Design PrinciplesCopyright © 2014 by McGraw-
Chapter 4Secure Design PrinciplesCopyright © 2014 by McGraw-Chapter 4Secure Design PrinciplesCopyright © 2014 by McGraw-
Chapter 4Secure Design PrinciplesCopyright © 2014 by McGraw-WilheminaRossi174
 

Similar to 1- An SA has no access to sensitive information by default- True False.pdf (20)

APManagement_FeatureGuide
APManagement_FeatureGuideAPManagement_FeatureGuide
APManagement_FeatureGuide
 
The Cloud Is NOT Just Someone Else's Computer
The Cloud Is NOT Just Someone Else's ComputerThe Cloud Is NOT Just Someone Else's Computer
The Cloud Is NOT Just Someone Else's Computer
 
Microservices and Kubernetes for your Full Data Lifecycle
Microservices and Kubernetes for your Full Data LifecycleMicroservices and Kubernetes for your Full Data Lifecycle
Microservices and Kubernetes for your Full Data Lifecycle
 
Survey Presentation About Application Security
Survey Presentation About Application SecuritySurvey Presentation About Application Security
Survey Presentation About Application Security
 
SCGOV Report
SCGOV ReportSCGOV Report
SCGOV Report
 
Security issues in cloud database
Security  issues  in cloud   database Security  issues  in cloud   database
Security issues in cloud database
 
Top IT Management Practices for Government Entities
Top IT Management Practices for Government EntitiesTop IT Management Practices for Government Entities
Top IT Management Practices for Government Entities
 
Unit 3
Unit 3Unit 3
Unit 3
 
Part 1You have been recently hired as a network security analyst.docx
Part 1You have been recently hired as a network security analyst.docxPart 1You have been recently hired as a network security analyst.docx
Part 1You have been recently hired as a network security analyst.docx
 
10 questions to ask your cloud provider
10 questions to ask your cloud provider10 questions to ask your cloud provider
10 questions to ask your cloud provider
 
Client Server Network Security
Client Server Network SecurityClient Server Network Security
Client Server Network Security
 
How to Boost Your Magento Store Security?
How to Boost Your Magento Store Security?How to Boost Your Magento Store Security?
How to Boost Your Magento Store Security?
 
Top 9 Critical Findings - Dramatically Improve Your Organization's Security
Top 9 Critical Findings - Dramatically Improve Your Organization's SecurityTop 9 Critical Findings - Dramatically Improve Your Organization's Security
Top 9 Critical Findings - Dramatically Improve Your Organization's Security
 
SQL Server 2012 Security Task
SQL Server 2012 Security TaskSQL Server 2012 Security Task
SQL Server 2012 Security Task
 
Troubleshooting Urouter Problems: WebEx Presentation
Troubleshooting Urouter Problems: WebEx PresentationTroubleshooting Urouter Problems: WebEx Presentation
Troubleshooting Urouter Problems: WebEx Presentation
 
How to choose a suitable 4G cellular router
How to choose a suitable 4G cellular routerHow to choose a suitable 4G cellular router
How to choose a suitable 4G cellular router
 
IRJET- Attribute based Access Control for Cloud Data Storage
IRJET- Attribute based Access Control for Cloud Data StorageIRJET- Attribute based Access Control for Cloud Data Storage
IRJET- Attribute based Access Control for Cloud Data Storage
 
CP PLUS Camera Manual
CP PLUS Camera ManualCP PLUS Camera Manual
CP PLUS Camera Manual
 
3_Lesson-1_MAINTENANCE_maintaining .pptx
3_Lesson-1_MAINTENANCE_maintaining .pptx3_Lesson-1_MAINTENANCE_maintaining .pptx
3_Lesson-1_MAINTENANCE_maintaining .pptx
 
Chapter 4Secure Design PrinciplesCopyright © 2014 by McGraw-
Chapter 4Secure Design PrinciplesCopyright © 2014 by McGraw-Chapter 4Secure Design PrinciplesCopyright © 2014 by McGraw-
Chapter 4Secure Design PrinciplesCopyright © 2014 by McGraw-
 

More from 101lightings

1- An example of an axial bone is the a- Scapula b- Ilium c- Femur d-.pdf
1- An example of an axial bone is the a- Scapula b- Ilium c- Femur d-.pdf1- An example of an axial bone is the a- Scapula b- Ilium c- Femur d-.pdf
1- An example of an axial bone is the a- Scapula b- Ilium c- Femur d-.pdf101lightings
 
1- Albert Gaytor and his wife Allison are married and file a joint ret.pdf
1- Albert Gaytor and his wife Allison are married and file a joint ret.pdf1- Albert Gaytor and his wife Allison are married and file a joint ret.pdf
1- Albert Gaytor and his wife Allison are married and file a joint ret.pdf101lightings
 
1- A static budget is one developed for a single level of activity2- T.pdf
1- A static budget is one developed for a single level of activity2- T.pdf1- A static budget is one developed for a single level of activity2- T.pdf
1- A static budget is one developed for a single level of activity2- T.pdf101lightings
 
1- A user working remotely has a secure VPN access to an Operating Sys.pdf
1- A user working remotely has a secure VPN access to an Operating Sys.pdf1- A user working remotely has a secure VPN access to an Operating Sys.pdf
1- A user working remotely has a secure VPN access to an Operating Sys.pdf101lightings
 
1- A patient exhibits abnormally low levels of circulating IgE antibod.pdf
1- A patient exhibits abnormally low levels of circulating IgE antibod.pdf1- A patient exhibits abnormally low levels of circulating IgE antibod.pdf
1- A patient exhibits abnormally low levels of circulating IgE antibod.pdf101lightings
 
1) What is Linkage disequilibrium as applied to HLA antigens- 2) What.pdf
1) What is Linkage disequilibrium as applied to HLA antigens- 2) What.pdf1) What is Linkage disequilibrium as applied to HLA antigens- 2) What.pdf
1) What is Linkage disequilibrium as applied to HLA antigens- 2) What.pdf101lightings
 
1- --Sea otters are native to the western cosst of North America- Betw.pdf
1- --Sea otters are native to the western cosst of North America- Betw.pdf1- --Sea otters are native to the western cosst of North America- Betw.pdf
1- --Sea otters are native to the western cosst of North America- Betw.pdf101lightings
 
1- (6nts) Calculate the NIPA measures in AC from the alphabetized Nati.pdf
1- (6nts) Calculate the NIPA measures in AC from the alphabetized Nati.pdf1- (6nts) Calculate the NIPA measures in AC from the alphabetized Nati.pdf
1- (6nts) Calculate the NIPA measures in AC from the alphabetized Nati.pdf101lightings
 
1- List and describe briefly the Constitutional amendments included i.pdf
1-  List and describe briefly the Constitutional amendments included i.pdf1-  List and describe briefly the Constitutional amendments included i.pdf
1- List and describe briefly the Constitutional amendments included i.pdf101lightings
 
1- Distinguish between diversity and inclusion- 2- Using Google as a.pdf
1-  Distinguish between diversity and inclusion- 2-  Using Google as a.pdf1-  Distinguish between diversity and inclusion- 2-  Using Google as a.pdf
1- Distinguish between diversity and inclusion- 2- Using Google as a.pdf101lightings
 
1- Select TWO of the three most densely populated major regions of t (1).pdf
1-   Select TWO of the three most densely populated major regions of t (1).pdf1-   Select TWO of the three most densely populated major regions of t (1).pdf
1- Select TWO of the three most densely populated major regions of t (1).pdf101lightings
 
1)is the external conditions- including natural surroundings- people-.pdf
1)is the external conditions- including natural surroundings- people-.pdf1)is the external conditions- including natural surroundings- people-.pdf
1)is the external conditions- including natural surroundings- people-.pdf101lightings
 
1)Certain amino acids are essential nutrients for some microorganisms.pdf
1)Certain amino acids are essential nutrients for some microorganisms.pdf1)Certain amino acids are essential nutrients for some microorganisms.pdf
1)Certain amino acids are essential nutrients for some microorganisms.pdf101lightings
 
1+2+3++n-(n+12).pdf
1+2+3++n-(n+12).pdf1+2+3++n-(n+12).pdf
1+2+3++n-(n+12).pdf101lightings
 
1) What are the advantages and disadvantages of using HPC therapy-2) C.pdf
1) What are the advantages and disadvantages of using HPC therapy-2) C.pdf1) What are the advantages and disadvantages of using HPC therapy-2) C.pdf
1) What are the advantages and disadvantages of using HPC therapy-2) C.pdf101lightings
 
1- Olivia and Jake walk into CVS looking for chips and candy-.pdf
1-          Olivia and Jake walk into CVS looking for chips and candy-.pdf1-          Olivia and Jake walk into CVS looking for chips and candy-.pdf
1- Olivia and Jake walk into CVS looking for chips and candy-.pdf101lightings
 
1) Discuss why the phenotype-driven developmental genetics utilizing s.pdf
1) Discuss why the phenotype-driven developmental genetics utilizing s.pdf1) Discuss why the phenotype-driven developmental genetics utilizing s.pdf
1) Discuss why the phenotype-driven developmental genetics utilizing s.pdf101lightings
 
1) Which of the following violates the Foreign Corrupt Practices Act (.pdf
1) Which of the following violates the Foreign Corrupt Practices Act (.pdf1) Which of the following violates the Foreign Corrupt Practices Act (.pdf
1) Which of the following violates the Foreign Corrupt Practices Act (.pdf101lightings
 
1) What are some of the historical figures- technologies- and standard.pdf
1) What are some of the historical figures- technologies- and standard.pdf1) What are some of the historical figures- technologies- and standard.pdf
1) What are some of the historical figures- technologies- and standard.pdf101lightings
 
1) What do Managers do- 2) Is it more important for managers to be eff.pdf
1) What do Managers do- 2) Is it more important for managers to be eff.pdf1) What do Managers do- 2) Is it more important for managers to be eff.pdf
1) What do Managers do- 2) Is it more important for managers to be eff.pdf101lightings
 

More from 101lightings (20)

1- An example of an axial bone is the a- Scapula b- Ilium c- Femur d-.pdf
1- An example of an axial bone is the a- Scapula b- Ilium c- Femur d-.pdf1- An example of an axial bone is the a- Scapula b- Ilium c- Femur d-.pdf
1- An example of an axial bone is the a- Scapula b- Ilium c- Femur d-.pdf
 
1- Albert Gaytor and his wife Allison are married and file a joint ret.pdf
1- Albert Gaytor and his wife Allison are married and file a joint ret.pdf1- Albert Gaytor and his wife Allison are married and file a joint ret.pdf
1- Albert Gaytor and his wife Allison are married and file a joint ret.pdf
 
1- A static budget is one developed for a single level of activity2- T.pdf
1- A static budget is one developed for a single level of activity2- T.pdf1- A static budget is one developed for a single level of activity2- T.pdf
1- A static budget is one developed for a single level of activity2- T.pdf
 
1- A user working remotely has a secure VPN access to an Operating Sys.pdf
1- A user working remotely has a secure VPN access to an Operating Sys.pdf1- A user working remotely has a secure VPN access to an Operating Sys.pdf
1- A user working remotely has a secure VPN access to an Operating Sys.pdf
 
1- A patient exhibits abnormally low levels of circulating IgE antibod.pdf
1- A patient exhibits abnormally low levels of circulating IgE antibod.pdf1- A patient exhibits abnormally low levels of circulating IgE antibod.pdf
1- A patient exhibits abnormally low levels of circulating IgE antibod.pdf
 
1) What is Linkage disequilibrium as applied to HLA antigens- 2) What.pdf
1) What is Linkage disequilibrium as applied to HLA antigens- 2) What.pdf1) What is Linkage disequilibrium as applied to HLA antigens- 2) What.pdf
1) What is Linkage disequilibrium as applied to HLA antigens- 2) What.pdf
 
1- --Sea otters are native to the western cosst of North America- Betw.pdf
1- --Sea otters are native to the western cosst of North America- Betw.pdf1- --Sea otters are native to the western cosst of North America- Betw.pdf
1- --Sea otters are native to the western cosst of North America- Betw.pdf
 
1- (6nts) Calculate the NIPA measures in AC from the alphabetized Nati.pdf
1- (6nts) Calculate the NIPA measures in AC from the alphabetized Nati.pdf1- (6nts) Calculate the NIPA measures in AC from the alphabetized Nati.pdf
1- (6nts) Calculate the NIPA measures in AC from the alphabetized Nati.pdf
 
1- List and describe briefly the Constitutional amendments included i.pdf
1-  List and describe briefly the Constitutional amendments included i.pdf1-  List and describe briefly the Constitutional amendments included i.pdf
1- List and describe briefly the Constitutional amendments included i.pdf
 
1- Distinguish between diversity and inclusion- 2- Using Google as a.pdf
1-  Distinguish between diversity and inclusion- 2-  Using Google as a.pdf1-  Distinguish between diversity and inclusion- 2-  Using Google as a.pdf
1- Distinguish between diversity and inclusion- 2- Using Google as a.pdf
 
1- Select TWO of the three most densely populated major regions of t (1).pdf
1-   Select TWO of the three most densely populated major regions of t (1).pdf1-   Select TWO of the three most densely populated major regions of t (1).pdf
1- Select TWO of the three most densely populated major regions of t (1).pdf
 
1)is the external conditions- including natural surroundings- people-.pdf
1)is the external conditions- including natural surroundings- people-.pdf1)is the external conditions- including natural surroundings- people-.pdf
1)is the external conditions- including natural surroundings- people-.pdf
 
1)Certain amino acids are essential nutrients for some microorganisms.pdf
1)Certain amino acids are essential nutrients for some microorganisms.pdf1)Certain amino acids are essential nutrients for some microorganisms.pdf
1)Certain amino acids are essential nutrients for some microorganisms.pdf
 
1+2+3++n-(n+12).pdf
1+2+3++n-(n+12).pdf1+2+3++n-(n+12).pdf
1+2+3++n-(n+12).pdf
 
1) What are the advantages and disadvantages of using HPC therapy-2) C.pdf
1) What are the advantages and disadvantages of using HPC therapy-2) C.pdf1) What are the advantages and disadvantages of using HPC therapy-2) C.pdf
1) What are the advantages and disadvantages of using HPC therapy-2) C.pdf
 
1- Olivia and Jake walk into CVS looking for chips and candy-.pdf
1-          Olivia and Jake walk into CVS looking for chips and candy-.pdf1-          Olivia and Jake walk into CVS looking for chips and candy-.pdf
1- Olivia and Jake walk into CVS looking for chips and candy-.pdf
 
1) Discuss why the phenotype-driven developmental genetics utilizing s.pdf
1) Discuss why the phenotype-driven developmental genetics utilizing s.pdf1) Discuss why the phenotype-driven developmental genetics utilizing s.pdf
1) Discuss why the phenotype-driven developmental genetics utilizing s.pdf
 
1) Which of the following violates the Foreign Corrupt Practices Act (.pdf
1) Which of the following violates the Foreign Corrupt Practices Act (.pdf1) Which of the following violates the Foreign Corrupt Practices Act (.pdf
1) Which of the following violates the Foreign Corrupt Practices Act (.pdf
 
1) What are some of the historical figures- technologies- and standard.pdf
1) What are some of the historical figures- technologies- and standard.pdf1) What are some of the historical figures- technologies- and standard.pdf
1) What are some of the historical figures- technologies- and standard.pdf
 
1) What do Managers do- 2) Is it more important for managers to be eff.pdf
1) What do Managers do- 2) Is it more important for managers to be eff.pdf1) What do Managers do- 2) Is it more important for managers to be eff.pdf
1) What do Managers do- 2) Is it more important for managers to be eff.pdf
 

Recently uploaded

[GDSC YCCE] Build with AI Online Presentation
[GDSC YCCE] Build with AI Online Presentation[GDSC YCCE] Build with AI Online Presentation
[GDSC YCCE] Build with AI Online PresentationGDSCYCCE
 
Neurulation and the formation of the neural tube
Neurulation and the formation of the neural tubeNeurulation and the formation of the neural tube
Neurulation and the formation of the neural tubeSaadHumayun7
 
Morse OER Some Benefits and Challenges.pptx
Morse OER Some Benefits and Challenges.pptxMorse OER Some Benefits and Challenges.pptx
Morse OER Some Benefits and Challenges.pptxjmorse8
 
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽中 央社
 
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT VẬT LÝ 2024 - TỪ CÁC TRƯỜNG, TRƯ...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT VẬT LÝ 2024 - TỪ CÁC TRƯỜNG, TRƯ...TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT VẬT LÝ 2024 - TỪ CÁC TRƯỜNG, TRƯ...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT VẬT LÝ 2024 - TỪ CÁC TRƯỜNG, TRƯ...Nguyen Thanh Tu Collection
 
Dementia (Alzheimer & vasular dementia).
Dementia (Alzheimer & vasular dementia).Dementia (Alzheimer & vasular dementia).
Dementia (Alzheimer & vasular dementia).Mohamed Rizk Khodair
 
INU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdf
INU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdfINU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdf
INU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdfbu07226
 
Pragya Champions Chalice 2024 Prelims & Finals Q/A set, General Quiz
Pragya Champions Chalice 2024 Prelims & Finals Q/A set, General QuizPragya Champions Chalice 2024 Prelims & Finals Q/A set, General Quiz
Pragya Champions Chalice 2024 Prelims & Finals Q/A set, General QuizPragya - UEM Kolkata Quiz Club
 
Danh sách HSG Bộ môn cấp trường - Cấp THPT.pdf
Danh sách HSG Bộ môn cấp trường - Cấp THPT.pdfDanh sách HSG Bộ môn cấp trường - Cấp THPT.pdf
Danh sách HSG Bộ môn cấp trường - Cấp THPT.pdfQucHHunhnh
 
Basic_QTL_Marker-assisted_Selection_Sourabh.ppt
Basic_QTL_Marker-assisted_Selection_Sourabh.pptBasic_QTL_Marker-assisted_Selection_Sourabh.ppt
Basic_QTL_Marker-assisted_Selection_Sourabh.pptSourabh Kumar
 
UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...
UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...
UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...Sayali Powar
 
Post Exam Fun(da) Intra UEM General Quiz 2024 - Prelims q&a.pdf
Post Exam Fun(da) Intra UEM General Quiz 2024 - Prelims q&a.pdfPost Exam Fun(da) Intra UEM General Quiz 2024 - Prelims q&a.pdf
Post Exam Fun(da) Intra UEM General Quiz 2024 - Prelims q&a.pdfPragya - UEM Kolkata Quiz Club
 
Basic Civil Engg Notes_Chapter-6_Environment Pollution & Engineering
Basic Civil Engg Notes_Chapter-6_Environment Pollution & EngineeringBasic Civil Engg Notes_Chapter-6_Environment Pollution & Engineering
Basic Civil Engg Notes_Chapter-6_Environment Pollution & EngineeringDenish Jangid
 
An Overview of the Odoo 17 Discuss App.pptx
An Overview of the Odoo 17 Discuss App.pptxAn Overview of the Odoo 17 Discuss App.pptx
An Overview of the Odoo 17 Discuss App.pptxCeline George
 
philosophy and it's principles based on the life
philosophy and it's principles based on the lifephilosophy and it's principles based on the life
philosophy and it's principles based on the lifeNitinDeodare
 
MichaelStarkes_UncutGemsProjectSummary.pdf
MichaelStarkes_UncutGemsProjectSummary.pdfMichaelStarkes_UncutGemsProjectSummary.pdf
MichaelStarkes_UncutGemsProjectSummary.pdfmstarkes24
 
Championnat de France de Tennis de table/
Championnat de France de Tennis de table/Championnat de France de Tennis de table/
Championnat de France de Tennis de table/siemaillard
 
Salient features of Environment protection Act 1986.pptx
Salient features of Environment protection Act 1986.pptxSalient features of Environment protection Act 1986.pptx
Salient features of Environment protection Act 1986.pptxakshayaramakrishnan21
 
Mbaye_Astou.Education Civica_Human Rights.pptx
Mbaye_Astou.Education Civica_Human Rights.pptxMbaye_Astou.Education Civica_Human Rights.pptx
Mbaye_Astou.Education Civica_Human Rights.pptxnuriaiuzzolino1
 

Recently uploaded (20)

[GDSC YCCE] Build with AI Online Presentation
[GDSC YCCE] Build with AI Online Presentation[GDSC YCCE] Build with AI Online Presentation
[GDSC YCCE] Build with AI Online Presentation
 
Neurulation and the formation of the neural tube
Neurulation and the formation of the neural tubeNeurulation and the formation of the neural tube
Neurulation and the formation of the neural tube
 
Word Stress rules esl .pptx
Word Stress rules esl               .pptxWord Stress rules esl               .pptx
Word Stress rules esl .pptx
 
Morse OER Some Benefits and Challenges.pptx
Morse OER Some Benefits and Challenges.pptxMorse OER Some Benefits and Challenges.pptx
Morse OER Some Benefits and Challenges.pptx
 
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
 
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT VẬT LÝ 2024 - TỪ CÁC TRƯỜNG, TRƯ...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT VẬT LÝ 2024 - TỪ CÁC TRƯỜNG, TRƯ...TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT VẬT LÝ 2024 - TỪ CÁC TRƯỜNG, TRƯ...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT VẬT LÝ 2024 - TỪ CÁC TRƯỜNG, TRƯ...
 
Dementia (Alzheimer & vasular dementia).
Dementia (Alzheimer & vasular dementia).Dementia (Alzheimer & vasular dementia).
Dementia (Alzheimer & vasular dementia).
 
INU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdf
INU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdfINU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdf
INU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdf
 
Pragya Champions Chalice 2024 Prelims & Finals Q/A set, General Quiz
Pragya Champions Chalice 2024 Prelims & Finals Q/A set, General QuizPragya Champions Chalice 2024 Prelims & Finals Q/A set, General Quiz
Pragya Champions Chalice 2024 Prelims & Finals Q/A set, General Quiz
 
Danh sách HSG Bộ môn cấp trường - Cấp THPT.pdf
Danh sách HSG Bộ môn cấp trường - Cấp THPT.pdfDanh sách HSG Bộ môn cấp trường - Cấp THPT.pdf
Danh sách HSG Bộ môn cấp trường - Cấp THPT.pdf
 
Basic_QTL_Marker-assisted_Selection_Sourabh.ppt
Basic_QTL_Marker-assisted_Selection_Sourabh.pptBasic_QTL_Marker-assisted_Selection_Sourabh.ppt
Basic_QTL_Marker-assisted_Selection_Sourabh.ppt
 
UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...
UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...
UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...
 
Post Exam Fun(da) Intra UEM General Quiz 2024 - Prelims q&a.pdf
Post Exam Fun(da) Intra UEM General Quiz 2024 - Prelims q&a.pdfPost Exam Fun(da) Intra UEM General Quiz 2024 - Prelims q&a.pdf
Post Exam Fun(da) Intra UEM General Quiz 2024 - Prelims q&a.pdf
 
Basic Civil Engg Notes_Chapter-6_Environment Pollution & Engineering
Basic Civil Engg Notes_Chapter-6_Environment Pollution & EngineeringBasic Civil Engg Notes_Chapter-6_Environment Pollution & Engineering
Basic Civil Engg Notes_Chapter-6_Environment Pollution & Engineering
 
An Overview of the Odoo 17 Discuss App.pptx
An Overview of the Odoo 17 Discuss App.pptxAn Overview of the Odoo 17 Discuss App.pptx
An Overview of the Odoo 17 Discuss App.pptx
 
philosophy and it's principles based on the life
philosophy and it's principles based on the lifephilosophy and it's principles based on the life
philosophy and it's principles based on the life
 
MichaelStarkes_UncutGemsProjectSummary.pdf
MichaelStarkes_UncutGemsProjectSummary.pdfMichaelStarkes_UncutGemsProjectSummary.pdf
MichaelStarkes_UncutGemsProjectSummary.pdf
 
Championnat de France de Tennis de table/
Championnat de France de Tennis de table/Championnat de France de Tennis de table/
Championnat de France de Tennis de table/
 
Salient features of Environment protection Act 1986.pptx
Salient features of Environment protection Act 1986.pptxSalient features of Environment protection Act 1986.pptx
Salient features of Environment protection Act 1986.pptx
 
Mbaye_Astou.Education Civica_Human Rights.pptx
Mbaye_Astou.Education Civica_Human Rights.pptxMbaye_Astou.Education Civica_Human Rights.pptx
Mbaye_Astou.Education Civica_Human Rights.pptx
 

1- An SA has no access to sensitive information by default- True False.pdf

  • 1. 1. An SA has no access to sensitive information by default. True False 2. Dynamic network configuration allows central management of network infrastructure. True False 3. Virtual networks can provide security between virtual servers. True False 4. When debugging, you should find the state of the service/system. True False 5. A service monitor should be able to determine if the service is responding correctly. True False 6. A name space can be used to storage usernames. True False 7. A demilitarized zone should have total access to the Internet. True False 8. Changes should be managed by a process, so changes need a minimum amount of approval, to protect operations. True
  • 2. False 9. An open architecture means that a service is not proprietary. True False 10 Prior to release, antivirus software should be centrally managed and updates should be quickly reviewed. True False 11 When a computer is ready to be deployed, it should be done and ready to work. True False 12 Even though it may be difficult, shared passwords must be changed immediately when terminating an SA. True False 13 Email is made up of several open standards. True False 14 A change request should include nontechnical and technical details. True False 15 When gathering requirements, it is important to know what will be used to perform an action not only the protocol or how. True False