Network+ Guide to Networks 7th ed. Quiz Ch. 12

¡Supera tus tareas y exámenes ahora con Quizwiz!

​An active card, which contains an internal battery, can provide a usable range of up to what distance?

150 m

Describe a service level agreement.​

A SLA (service level agreement) is a legally binding contract or part of a contract that defines, in plain language and in measurable terms, the aspects of a service provided to a customer, such as the service provided by an ISP. Details specified might include contact duration (minimum or maximum), guaranteed uptime, problem management, performance benchmarks, and termination options.

What is a historian?​

A centralized database of collected and analyzed data and control activities.

Explain what an RFP is.​

An REF (Request for Proposal) is a request to vendors to submit a proposal for a product or service your company wants to purchase. Key parts of an RFP include why your company requires the product or service, how the product or service will be used, how and when the proposals will be evaluated, and a list of items a vendor should include in its proposal.

_________ is a process of investigating deeper data on a computer and will essentially autopsy the computer to discover hidden data, such as deleted files and file fragments, and who has accessed that data and when.

Computer forensics

In order to provide access to a historian by personnel working on the corporate network that are not authorized to work on the ICS network, where should the historian be placed?​

DMZ

Any device in an ICS that is motorized and can control the physical system is called a fieldbus.

False

The first step of a response policy should be to secure the area.​

False

​An enclosure made of conductive material that is designed to block electromagnetic signals, including Wi-Fi.

Faraday cage

If a destructive program is running that might be destroying evidence, what should be done?​

Pull the power cable

A document that details the work that must be completed for a particular project, including specifics such as tasks, deliverables, standards, payment schedule, and work timeline.​

SOW (statement of work)

Cipher locks are not designed for physical security, such as on an outside door.

True

Every security policy should include a response policy, which specifically defines the characteristics of an event that qualifies as a formal incident and the steps that should be followed as a result.

True

The first step in asset management is to inventory all the components on the network.​

True

​An ICS server that collects and stores raw data. This server connects to field devices from which it receives the raw data and passes that information on to other servers in the SCADA system.

acquisitions server

What type of physical security solution involves a device that scans an individual's unique physical characteristics?​

biorecognition access

​A method of authentication in which a device scans an individual's unique physical characteristics, such as the color patterns in her iris or the geometry of her hand, to verify the user's identity.

biorecognition access

The goal of a disaster recovery plan is to ensure ____________.​

business continuity

Which type of disaster recovery site is a place where the computers, devices, and connectivity necessary to rebuild a network exist, but they are not appropriately configured, updated, or connected?

cold site

A magnetic hard drive eraser.

degausser

What type of device can be used to erase contents of a hard drive using a magnetic field?​

degausser

A rollback is also known by what two terms below?​

downgrading

A ___________ is an enclosure made of a conductive material that is designed to block electromagnetic signals, including Wi-Fi.​

faraday cage

At what type of recovery site would computers, devices, and connectivity necessary to rebuilt a network exist, and all are appropriately configured, updated, and connected to match your network's current state?​

hot site

​A computer, including hardware and software, that technicians use to monitor and manage physical systems in an industrial system

human-machine interfaces (HMI)

The time period in which a change can be implemented is known as what option below?​

maintenance window

What team member role coordinates the resources necessary to solve a problem?​

manager

​A supervisory computer or server in an ICS or SCADA system that controls the physical system. Also called the control server or the SCADA server.

master terminal unit (MTU)

What type of software is a correction, improvement, or enhancement to a piece of software?​

patch

​A smart card that does not require direct contact with a proximity reader in order to be detected and read.

prior card

Microsoft sometimes releases a major group of patches to Windows or a Microsoft application, which it calls a ___________.

service pack

​An electronic access badge.

smart card

​A term that sometimes refers to wired communication, but generally refers to wireless communication that transmits data regarding specific measurements and conditions, such as weather data transmitted from a weather balloon to ground antennas.

telemetry

A __________ is a small network that is segmented from the rest of the network, and contains computers, called test beds.​

testing lab

Which type of recovery site is a place where computers, devices, and connectivity necessary to rebuild a network exist, with some pieces ​appropriately configured, updated, or connected?

warm site

Which of the following is NOT a step that should be taken as part of a ​response policy?

​Attempt to access files to determine if they are compromised

What should be the first step of a response policy?​

​Determine if escalation is necessary

A server that collects and stores raw data, and connects to field devices from which it receives raw data and passes data on to other SCADA systems, is known as what two terms below?​

​I/O server, ​acquisitions server

​In computer forensics, hidden data such as deleted files and file fragments are known as what term?

​ambient data

eDiscovery and computer forensics reveal what two different types of data?​

​ambient data, ​active data

What two methods might be used by an ICS to control a physical system?​

​closed loop system, ​open loop system

Which team role is the person on call who first notices or is alerted to a problem?​

​dispatcher

​What two terms describe the process that can reveal a great deal of information, called ESI (electronically stored information)?

​electronic discovery

Upon receipt of what type of notification is a company required to activate a defensible policy for the preservation of relevant data?​

​legal hold

When performing inventory on software packages, which of the following is not something that should be inventoried?​

​proprietary source code

What team member role, if necessary, learns about the situation and the response and then acts as official spokesperson for the organization to the public or other interested parties?​

​public relations specialist

What team member role focuses on only one thing: solving the problem as quickly as possible?​

​technical support specialist


Conjuntos de estudio relacionados

NUR 304 Chapter 49 Concepts of Care for Patients with Inflammatory Intestinal Conditions

View Set

Business Management and Administration Career Cluster

View Set

American History Unit 2: Lesson 4 - The Plains Indian Wars

View Set

Automotive Electronics Practice Test

View Set

AUTO I: Study Guide 1st Nine Weeks

View Set

Chapter 16: Outcome Identification and Planning

View Set

Unit 6 Identify, Access, and Account Management

View Set