Which tool can be used to view and modify the Windows registry?
Regedit
Your Windows server performance has degraded significantly. You need to determine if a specific service is consuming most of the CPU time. Which tool should you use?
Task Manager
Which hardware security component can be used to store BitLocker encryption keys?
Trusted Platform Module (TPM)
How does a Windows data collector set (DCS) differ from using Performance Monitor?
A DCS can be scheduled
What is Patching
Patching involves applying updates to
software and systems to address
vulnerabilities
What are the four steps in the Patch Management Process?
What are the four sub-categories of Configuration Management?
What are the Risk Management Principles?
Define policies and governance
Define Threat Modeling
Threat Modeling a systematic approach to identifying and mitigating security threats
What is the difference between a credentialed and a non-credentialed vulnerability scan?
When analyzing data to prioritize vulnerabilities, what factors should an analyst consider?
The analyst should consider the data classification of the information on the system, whether the system is internet-exposed, what services it offers, and its role (e.g., production, test, development)
What type of issue might an analyst suspect if a vulnerability scan reports flags an administrator account with a password that never expires?
This issue indicates a misconfiguration or a lack of appropriate domain security policies that could affect many other systems on the network