IST 220 Chapter 12 Quiz

¡Supera tus tareas y exámenes ahora con Quizwiz!

A simple network management protocol (SNMP) trap is a

Message

All of the following are true of measuring network performance except

a good tool should have a positive effect on what it is measuring

A service level agreement (SLA) is typically an agreement between ___ and ___

a service provider; a customer

Lin is an IT networking professional for a large corporation. She is evaluating a new management system for the network. The system will track network resource use and bill various departments and units for that use. What type of management system is Lin evaluating

accounting management

A formal process of comparing measurements to one or more baselines is referred to as

an audit

Which of the following describes the need maintain secondary copies of critical data and infrastructure components

data loss prevention policy

All of the following are true of a network management system (NMS), except

due to the type of monitoring they perform, NMSs focus on wired networks only

What type of attack occurs when an attacker accesses the network between a sender and receiver

eavesdropping

true or false? a central network management system (NMS) receives SNMP agent settings from monitored devices

false

true or false? bandwidth is a measure of how long a packet takes to travel from one node to another

false

true or false? fault management is concerned mainly with the speed and integrity with which packets are delivered

false

true or false? loss prevention is the process of dismantling an asset for the value of its parts

false

true or false? network operations center (NOC) managers typically monitor infrastructure performance and overall health

false

true or false? the "P" in FCAPS stands for "physical"

false

Which of the following is a reactive rather than proactice best practice

identify the scope of the fault

Devaki is a security professional. She wants to better align IT services with organizational business requirements. She is working on an IT service catalog so that people in her company understand the specific services they can expect from the IT department. She also plans to update some of the company's IT security policies. Which of the following is the best resrouce for her consult

information technology infrastructure library (ITIL)

All of the following are characteristics of a network operations center (NOC), except

it is part of large enterprise environments only

Which of the following puts the burden of security on authentication/authorization

least privilege

A ___ is a databse of characteristics for a specific type of device

management information base (MIB)

Configuration management helps to do all of the following except

monitoring how well the network meets performance standards

Which security approach is described as a series of concentric rings around protected resoruces

multilayered defense

Which of the following describes how credentials are created and assigned for new personnel and how IR resource access is removed when any person leaves the organization

on-boarding/off-boarding procedure

Bill is an IT specialist. he has set up a variety of procedues, devices, software programs, and actions to monitor the company's hardware and software. One day, a monitoring toll detects a fault on the network. Bill locates the fault, evaluates it, and then resovles it. What is a simple way to describe what Bill has done

practiced fauly management

"Identify all single points of failure" is an example of which type of best practice

preventive measure

The purpose of which type of attack is to gather intelligence for other impending attacks

reconnaissance

The purpose of a change control board (CCB) is to

review and approve of reject configuration change requests

true or false? a benchmark is the standard to which a system is compared to determine whether it is properly configured for optimal operation

true

true or false? a network management dashboard is a collection of visual indicators that enables you to quickly see how well (or poorly) the network is functioning

true

true or false? a network management system (NMS) should look for anything out of the ordinary and take when it identifies unusual activity

true

true or false? a nondisclosure agreement (NDA) prohibits accessors of intellectual property from divulging its contents to any other entity

true

true or false? a simple network management protocol (SNMP) based system collects and processes information about network devices

true

true or false? any event that results in a violation of any CIA security property is called a security breach

true

true or false? asset management and inventory have both a financial and an operational component

true

true or false? it is a good idea to have representatives from the finance and procurement departments on a change control board

true

true or false? organizations should have an agreement privileged users sign to acknowledge and accept restrictions of what they can do

true

true or false? radio frequency (RFID) readers installed in mobile systems can inventory an entire warehouse in a matter of minutes

true

true or false? securing the perimeter means physically limiting access to the facility

true

true or false? the two main approaches to securing a network are to remove network connectivity to sensitive resources and add countermeasures to protect and sensitive resources

true

true or false? throughput is a common network performance metric

true

true or false? with a multilayered defense, attackers should encounter a chain of security controls regardless of the path they take to a resource

true


Conjuntos de estudio relacionados

Chapter 18 - Disorders of blood flow and blood pressure

View Set

English 102: Connect: Evaluating Information Sources

View Set

Chapter 9: Aggregate Demand and Aggregate Supply keywords

View Set

Close Read: I Know Why the Caged Bird Sings

View Set

Chapter 7 : McGraw Hill Reading Questions - Bus 431

View Set

CompTIA A+ 220-1101 Official Exam Questions and Answers (Page 2)

View Set