SEC 110 ch 9

¡Supera tus tareas y exámenes ahora con Quizwiz!

Your organization recently purchased 18 iPad tablets for use by the organization's management team. These devices have iOS pre-installed on them. To increase the security of these devices, you want to apply a default set of security-related configuration settings. What is the BEST approach to take to accomplish this? (Select two. Each option is part of a complete solution.) -Join the tablets to a Windows domain. -Configure and apply security policy settings in a mobile device management (MDM) system. -Configure and distribute security settings in a configuration profile. -Enroll the devices in a mobile device management (MDM) system. -Require users to install the configuration profile. -Configure security settings in a Group Policy Object.

-Configure and apply security policy settings in a mobile device management (MDM) system. -Enroll the devices in a mobile device management (MDM) system.

You are an application developer. You use a hypervisor with multiple virtual machines installed to test your applications on various operating systems' versions and editions. Currently, all of your virtual machines used for testing are connected to the production network through the hypervisor's network interface. However, you are concerned that the latest application you are working on could adversely impact other network hosts if errors exist in the code. To prevent issues, you decide to isolate the virtual machines from the production network. However, they still need to be able to communicate directly with each other. What should you do? (Select two. Both responses are part of the complete solution.) -Disconnect the network cable from the hypervisor's network interface. -Connect the virtual network interfaces in the virtual machines to the virtual switch. -Create MAC address filters on the network switch that block each virtual machine's virtual network interfaces. -Create a new virtual switch configured for host-only (internal) networking. -Create a new virtual switch configured for bridged (external) networking. -Disable the switch port the hypervisor's network interface is connected to.

-Connect the virtual network interfaces in the virtual machines to the virtual switch. -Create a new virtual switch configured for host-only (internal) networking.

How would you remediate a tablet or phone infected with malware?

-Consider implementing (NAC) Network Access Control solution thst remediates devices before allowing them to connect to your network.

Why do attackers prefer to conduct distributed network attacks in static environments? (Select two.) -Smart device vendors tend to proactively protect their products against security threats. -Devices are typically more difficult to monitor than traditional network devices. -These devices are typically installed in the DMZ that resides outside of an organization's perimeter firewall. -Devices tend to employ much weaker security than traditional network devices. -It is difficult to update the virus definitions used to protect these devices.

-Devices are typically more difficult to monitor than traditional network devices. -Devices tend to employ much weaker security than traditional network devices. ************************* Because these devices operate in a static environment, you typically can't install third-party software on them, including anti-malware scanners. Because of their relatively weak security, these devices should not be deployed in an unsecure area of a network, such as the DMZ.

Which of the following are true concerning virtual desktop infrastructure (VDI)? (Select two.) -In the event of a widespread malware infection, the administrator can quickly reimage all user desktops on a few central servers. -Roaming profiles must be configured to allow mobile users to keep their same desktop environment across systems. -User desktop environments are provided by individual desktop systems instead of by remote servers. -User desktop environments are centrally hosted on servers instead of on individual desktop systems. -In the event of a widespread malware infection, the administrator can reimage user desktops by pushing an image out to each user desktop system over the network.

-In the event of a widespread malware infection, the administrator can quickly reimage all user desktops on a few central servers. -User desktop environments are centrally hosted on servers instead of on individual desktop systems.

Which two configurations can be used to deploy Windows Intune?

-Intune Standalone is the recommended deployment method. cloud-only option that is managed using a web console that can be accessed from anywhere with internet access. -Hybrid MDM with Configuration Manager is a solution that combines Intune's mobile device management capabilities into Configuration Manager.

Which of the following is a technique that disperses a workload between two or more computers or resources to achieve optimal resource utilization, throughput, or response time? -Hypervisor -Virtualization -Bottleneck -Load balancing

-Load balancing

Which of the following statements about virtual networks is true? (Select two.) -Each virtual network must be associated with a single physical network adapter. -Multiple virtual networks can be associated with a single physical network adapter. -Accessing network resources requires that the operating system on the virtual machine be configured on an isolated network. -A virtual network is independent of the configuration and physical hardware of the host operating system. -A virtual network is dependent on the configuration and physical hardware of the host operating system.

-Multiple virtual networks can be associated with a single physical network adapter. -A virtual network is dependent on the configuration and physical hardware of the host operating system.

What is isolating a virtual machine from the physical network to allow testing to be performed without impacting the production environment called? -Workload balancing -Resource pooling -Testing -Sandboxing

-Sandboxing

Match the software defined networking(SDN) layer to the appropriate function -This layer receives its requests from the Application layer. -This layer is also known as the Infrastructure layer. -This layer communicates with the Control layer through what is called the northbound interface. -This layer provides the Physical layer with configuration and instructions. -On this layer, individual networking devices use southbound APIs to communicate with the control plane. ************** application layer control layer physical layer

-This layer receives its requests from the Application layer.= Control layer -This layer is also known as the Infrastructure layer.=Physical layer This layer communicates with the Control layer through what is called the northbound interface=Application layer This layer provides the Physical layer with configuration and instructions=Control layer On this layer, individual networking devices use southbound APIs to communicate with the control plane=physical layer

You manage the information systems for a large manufacturing firm. Supervisory control and data acquisition (SCADA) devices are used on the manufacturing floor to manage your organization's automated factory equipment. The SCADA devices use embedded smart technology, allowing them to be managed using a mobile device app over an internet connection. You are concerned about the security of these devices. What can you do to increase their security posture? (Select two.) -Install a network monitoring agent on each device. -Install anti-malware software on each device. -Enroll each device in a mobile device management system. -Verify that your network's existing security infrastructure is working properly. -Install the latest firmware updates from the device manufacturer.

-Verify that your network's existing security infrastructure is working properly. -Install the latest firmware updates from the device manufacturer. ************************** Because these devices operate in a static environment, you typically can't install third-party software on them, including anti-malware scanners, monitoring agents, or mobile device management agents.

What does a mobile device management (MDM) solution allow you to do?

-replaces Group Policy

What is an acceptable use policy (AUP)? How does it benefit mobile security?

-specifies clearly what is acceptable and isn't acceptable in regards to work/electronics. -Employees cannot state that they did not know something when doing unacceptable things.

What is the minimum number of users needed in a Windows Enterprise agreement for Intune to be included? 1,000 500 100 No minimum

500

Subscriber identity module (SIM) card

A SIM card encrypts data transmission and stores information.

Which of the following cloud storage access services acts as a gatekeeper, extending an organization's security policies into the cloud storage infrastructure? -A web service application programming interface -A cloud-access security broker -A co-located cloud computer service -A cloud storage gateway

A cloud-access security broker A cloud-access security broker (CASB) may act as a gatekeeper, extending an organization's security policies into the cloud storage infrastructure. A CASB focuses on the visibility of company data, regulation compliance, user access, and data security through encryption and loss prevention.

Enterprise mobility management (EMM)

A combination of MDM and MAM solutions in one package. EMM allows a system, administrator to remotely manage hardware and applications on a mobile device.

Hybrid cloud

A combination of public, private, and community cloud resources from different service providers.

Which of the following are disadvantages of server virtualization? -It increases hardware costs. -A compromised host system might affect multiple servers. -Systems are isolated from each other and cannot interact with other systems. -A compromised guest system might affect multiple servers.

A compromised host system might affect multiple servers.

Virtual Network

A computer network consisting of virtual and physical devices.

Virtual hard disk (VHD)

A file that is created within the host operating system and simulates a hard disk for the virtual machine.

Users in the sales department perform many of their daily tasks, such as emailing and creating sales presentations, on their personal tablets. The chief information officer worries that one of these users might also use their tablet to steal sensitive information from the organization's network. Your job is to implement a solution that prevents insiders from accessing sensitive information stored on the organization's network from their personal devices while still giving them access to the internet. Which of the following should you implement? -A Network Access Control (NAC) solution -An Acceptable Use Policy (AUP) -A guest wireless network that is isolated from your organization's production network -A mobile device management (MDM) infrastructure

A guest wireless network that is isolated from your organization's production network

Cloud

A metaphor for the internet.

Users in the sales department perform many of their daily tasks, such as emailing and creating sales presentations, on company-owned tablets. These tablets contain sensitive information. If one of these tablets is lost or stolen, this information could end up in the wrong hands. The chief information officer wants you to implement a solution that can be used to keep sensitive information from getting into the wrong hands if a device is lost or stolen. Which of the following should you implement? -A guest wireless network that is isolated from your organization's production network -An Acceptable Use Policy (AUP) -A mobile device management (MDM) infrastructure -A Network Access Control (NAC) solution

A mobile device management (MDM) infrastructure

Virtual Private Network (VPN)

A secure tunnel to another network that connects multiple remote end-points.

Security group

A security group works like a firewall to control traffic to and from network resources.

Cloud-based firewall

A software network device that is deployed in the cloud that protects against unwanted access to a private network.

Container

A standard unit of software that holds the complete runtime environment including an application, all application dependencies, libraries, binaries, and configuration files.

Load balancing

A technique that disperses a workload between two or more computers or resources to achieve optimal resource utilization, throughput or response time.

Windows Information Protection

A technology that helps protect against data leakage on company-owned and personal devices without disrupting the user experience.

Hypervisor

A thin layer of software that resides between the guest operating system and the hardware. It creates and runs virtual machines.

Which of the following could be an example of a malicious insider attack? -A user's device has become infected with malware. -A user has lost a company-owned device. -A user has not implemented appropriate security settings. -A user uses the built-in microphone to record conversations.

A user uses the built-in microphone to record conversations.

Virtual area network(VAN)

A virtual LAN running on top of a physical LAN.

Virtual Machine(VM)

A virtual computer that functions like a physical computer.

Virtual private cloud (VPC) endpoint

A virtual device that provides a private connection between virtual private clouds and a cloud provider's services. A VPC endpoint keeps traffic secure with a private link resource.

Which of the following is a policy that defines appropriate and inappropriate usage of company resources, assets, and communications? Business continuity plan (BCP) Disaster recovery plan (DRP) Business impact analysis (BIA) Acceptable use policy (AUP)

Acceptable use policy (AUP)

Which of the following is the first phase of the Microsoft Intune application life cycle? Deploy Add Protect Configure

Add The first phase of the Microsoft Intune application life cycle is to add the apps that are to be managed and assigned in Intune. Deploy is the second phase. Configure is the third phase. Protect is the fourth phase.

Unified endpoint management (UEM)

All in one device management solution. UEM allows a system administrator to manage local and mobile devices, including internet of things devices.

Which of the following BEST describes the Physical SDN layer? -Sometimes called northbound APIs. -Gives new life to old networking hardware. -Receives its requests from the Application layer. -Also known as the Infrastructure layer.

Also known as the Infrastructure layer.

Which of the following defines an acceptable use agreement? -A legal contract between the organization and the employee that specifies that the employee is not to disclose the organization's confidential information. -An agreement that outlines the organization's monitoring activities. -An agreement that identifies employees' rights to use company property, such as internet access and computer equipment, for personal use. -An agreement that prohibits an employee from working for a competing organization for a specified period of time after he or she leaves the organization.

An agreement that identifies employees' rights to use company property, such as internet access and computer equipment, for personal use.

Software-defined networking

An architecture that allows network and security professionals to manage, control and make changes to a network.

Cloud access security broker (CASB)

An on-premises cloud based software tool or service that sits between an organization and a cloud service provider.

Which of the following app deployment and update methods can be configured to make available to specific users and groups only the apps that they have rights to access? BYOD App catalog Self-service portal Remote management

App catalog

Which process allows you to define specific apps that users can have on mobile devices?

App whitelist

Your organization recently purchased 20 Android tablets for use by the organization's management team. To increase the security of these devices, you want to ensure that only specific apps can be installed. Which of the following would you implement? Credential Manager Application Control App whitelisting App blacklisting

App whitelisting

Which SDN layer would a load balancer that stops and starts VMs as resource use increases reside on? Control Application Session Physical

Application

Which type of firewall operates at Layer 7 of the OSI model? Circuit-level gateway Packet-filtering Stateful Application layer

Application layer

Which of the following is an open-source hardware and software company that designs and manufactures single-board microcontrollers as well as kits to build digital devices? Raspberry Pi Arduino Microsoft Amazon

Arduino

Arduino

Arduino is an open-source hardware and software platform for building electronic projects.

Which device deployment model gives businesses significant control over device security while allowing employees to use their devices to access both corporate and personal data? CYOD BYOD COPE VDI

COPE

What is the difference between choose your own device (CYOD) and corporate owned, personally enabled(COPE)?

CYOD has more flexibility with expectations.

Which of the following provides the network virtualization solution called XenServer? Citrix Microsoft Cisco VMWare

Citrix

What is the on-premises, cloud-based software tool that sits between an organization and a cloud service provider called? Cloud-based firewall Secure web gateway Cloud native controls Cloud-access security broker

Cloud-access security broker

Which of the following can provide the most specific protection and monitoring capabilities? Cloud-access security broker Cloud-based firewall Secure web gateway Cloud native controls

Cloud-access security broker A cloud-access security broker (CASB) is an on-premises, cloud-based software tool or service that sits between an organization and a cloud service provider. A CASB can offer malware protection and encryption and can also give more specific protection and monitoring capabilities than secure web gateways (SWGs) and enterprise firewalls.

Which of the following is a network device that is deployed in the cloud to protect against unwanted access to a private network? Cloud native controls Virtual area network Cloud-access security broker Cloud-based firewall

Cloud-based firewall

Which of the following BEST describes the Application SDN layer? -Communicates with the Control layer through the northbound interface. -Receives its requests and then provides configuration and instructions. -Communicates with the Control layer through the southbound interface. -Is software that is able to inventory hardware components in the network.

Communicates with the Control layer through the northbound interface.

A group of small local businesses have joined together to share access to a cloud-based payment system. Which type of cloud is MOST likely being implemented? Hybrid Public Community Private

Community

Which of the following Intune portals is used by end users to manage their own account and enroll devices? Company portal Add Intune Users Admin portal Account portal

Company portal

In which phase of the Microsoft Intune application life cycle would you assign an app to users and/or devices you manage and monitor them on the Azure portal? Protect Add Configure Deploy

Deploy During the Deploy phase, apps are assigned to users and devices and then monitored on the Azure portal.

Cloud storage is a virtual service, so the infrastructure is the responsibility of the storage provider. Access control should be set as a local file system would be, with no need for the provider to have access to the stored data. You are implementing the following measures to secure your cloud storage: -Verify that security controls are the same as in a physical data center. -Use data classification policies. -Assign information into categories that determine storage, handling, and access requirements. -Assign information classification based on information sensitivity and criticality. Which of the following is another security measure you can implement? -Create versioned copies of your cloud data. -Dispose of data when it is no longer needed by using specialized tools. -Configure distributed resources to act as one in a federated architecture. -Configure redundancy and distribution of data.

Dispose of data when it is no longer needed by using specialized tools.

Which of the following mobile device management (MDM) solutions is hardware-agnostic and supports many different brands of mobile devices? UEM MAM EMM MDM

EMM

Which of the following are advantages of virtualization? (Select two.) -Easy migration of systems to different hardware -Reduced utilization of hardware resources -Centralized administration -Improved host-based attack detection -Redundancy of hardware components for fault tolerance

Easy migration of systems to different hardware Centralized administration ***Advantages of virtualization include: Server consolidation The ability to migrate systems between different hardware Centralized management of multiple systems Increase utilization of hardware resources Isolation of systems and applications

Which Amazon device can be used to control smart devices (such as lights) throughout a home using voice commands? Cortana Home Echo Siri

Echo

Which of the following is an exploit in which malware allows the virtual OS to interact directly with the hypervisor? Jump Load balancing Bottleneck Escape

Escape

Field Programmable Gate Array (FPGA)

FPGA is an integrated circuit that the customer configures.

Recently, a serious security breach occurred in your organization. An attacker was able to log in to the internal network and steal data through a VPN connection using the credentials assigned to a vice president in your organization. For security reasons, all individuals in upper management in your organization have unlisted home phone numbers and addresses. However, security camera footage from the vice president's home recorded someone rummaging through her garbage cans prior to the attack. The vice president admitted to writing her VPN login credentials on a sticky note that she subsequently threw away in her household trash. You suspect the attacker found the sticky note in the trash and used the credentials to log in to the network. You've reviewed the vice president's social media pages. You found pictures of her home posted, but you didn't notice anything in the photos that would give away her home address. She assured you that her smartphone was never misplaced prior to the attack. Which security weakness is the MOST likely cause of the security breach? -Sideloaded apps were installed on her smartphone. -Weak passwords were used on her smartphone. -Geotagging was enabled on her smartphone. -A Christmas tree attack was executed on her smartphone.

Geotagging was enabled on her smartphone.

Google Cloud, Amazon Web Services (AWS), and Microsoft Azure are some of the most widely used cloud storage solutions for enterprises. Which of the following factors prompt companies to take advantage of cloud storage? (Select two.) -Growing demand for storage -Need for a storage provider to manage access control -Need for Software as a Service (SaaS) for managing enterprise applications -Need for Platform as a Service (PaaS) for developing applications -Need to bring costs down

Growing demand for storage Need to bring costs down

Which of the following is a network virtualization solution provided by Microsoft? VirtualBox Citrix Hyper-V VMware

Hyper-V

Which of the following devices is computer software, firmware, or hardware that creates and runs virtual machines? -Virtual firewall -Hypervisor -Virtual switch -Virtual router

Hypervisor

Your organization allows employees to bring their own devices into work, but management is concerned that a malicious internal user could use a mobile device to conduct an insider attack. Which of the following should be implemented to help mitigate this threat? -Implement an AUP that specifies where and when mobile devices can be possessed within the organization. -Implement a Network Access Control (NAC) solution. -Implement a guest wireless network that is isolated from your organization's production network. -Implement an AUP that specifies which apps are allowed for use with organizational data.

Implement an AUP that specifies where and when mobile devices can be possessed within the organization.

How can you prevent malicious insider attacks?

Implement an acceptable use policy. *specify where and when mobile devices can be possessed within the company. * notify users that personally owned devices are subject to random searches on site.

Corporate owned, personally enabled

In a COPE system, the company provides a list of approved devices for an employee to choose from. The company owns the device; the employee uses and manages the device.

Choose your own device

In a CYOD system, the company provides a list of approved devices for an employee to choose from. The ownership and management of devices varies by organization.

The IT manager has tasked you with configuring Intune. You have enrolled the devices and now need to set up the Intune policies. Where would you go to set up the Intune policies? In the Company portal, select Policy > Add Policy. In the Admin portal, select Management > Policy > Add Policy. In the Admin portal, select Policy > Add Policy. In the Company portal, select Management > Policy > Add Policy.

In the Admin portal, select Policy > Add Policy.

Sideloading

Installing an app on a mobile device via a method other than the manufacturer's app repository.

Which of the following tools allows the user to set security rules for an instance of an application that interacts with one organization and different security rules for an instance of the application when interacting with another organization? Encryption Instance awareness Replication Integration

Instance awareness Instance awareness is the ability to apply cloud security within an application that has rules specific to an instance. This tool allows the user to set security rules for an instance of an app interacting with one organization and different security rules for an instance of the app when it interacts with another.

What is the system that connects application repositories, systems, and IT environments in a way that allows access and exchange of data over a network by multiple devices and locations called? High availability Instance awareness Integration Encryption

Integration Cloud integration is the system that connects application repositories, systems, and IT environments in a way that allows access and exchange of data over a network by multiple devices and locations.

You notice that a growing number of devices, such as environmental control systems and wearable devices, are connecting to your network. These devices, known as smart devices, are sending and receiving data via wireless network connections. Which of the following labels applies to this growing ecosystem of smart devices? -Internet of smart devices -Dynamic environment -Internet of Things (IoT) -The smartnet

Internet of Things (IoT) These smart devices are part of a growing ecosystem known as the Internet of Things (IoT). Environments that contain these types of devices are known as static environments. A static environment is one that never changes (or changes very infrequently) and that a network administrator has very little control over. For example, a smart television in an office has embedded technology that might never be updated, which creates a security hole in the company's network.

Your organization recently purchased 20 Android tablets for use by the organization's management team. You are using a Windows domain. Which of the following should you use to push security settings to the devices? Application Control Credential Manager Group Policy Intune

Intune Intune is Microsoft's cloud-based mobile device management (MDM) platform that allows a network administrator to remotely manage and secure mobile devices.

Which of the following is the recommend Intune configuration? Hybrid MDM Account portal Company portal Intune Standalone

Intune Standalone -Intune Standalone is the recommended deployment method. Intune Standalone is a cloud-only solution that is managed using a web console that can be accessed from anywhere with internet access.

Network fencing

Location compliance, known as network fencing, allows you to keep devices outside your corporate network from accessing network resources.

Which of the following is a solution that pushes security policies directly to mobile devices over a network connection? Mobile device management (MDM) Group Policy Application Control Credential Manager

Mobile device management (MDM)

Which of the following is an advantage of software-defined networking (SDN)? More granular control Lack of vendor support Standards are still being developed Is currently a new technology

More granular control

The IT manager has tasked you with implementing a solution that ensures that mobile devices are up to date, have anti-malware installed, and have the latest definition updates before being allowed to connect to the network. Which of the following should you implement? NAC MDM VDI BYOD

NAC

Which of the following does the Application layer use to communicate with the Control layer? Northbound APIs Controllers These layers do not communicate Southbound APIs

Northbound APIs

Which of the following BEST describes the Platform as a Service (PaaS) cloud computing service model? -PaaS delivers software applications to the client either over the internet or on a local area network (LAN). -PaaS delivers infrastructure to the client, such as processing, storage, networks, and virtualized environments. -PaaS stores and provides data from a centralized location without the need for local collection and storage. -PaaS delivers everything a developer needs to build an application on the cloud infrastructure.

PaaS delivers everything a developer needs to build an application on the cloud infrastructure.

Which type of firewall protects against packets coming from certain IP addresses? Application layer Packet-filtering Circuit-level Stateful

Packet-filtering Packet-filtering firewalls work on Layer 3. They are considered to be first-generation firewalls. These firewalls check a packet's source and destination address, protocol, and destination ports. They can protect against packets coming from certain IP addresses.

Private cloud

Platforms, applications, storage, or other resources that are made available to a single organization.

Public cloud

Platforms, applications, storage, or other resources that are made available to the general public by a cloud service provider.

Community cloud

Platforms, applications, storage, or other resources that are shared by several organizations.

Which of the following is an advantage of a virtual browser? -Prevents adware and spyware that monitor your internet activity -Protects the host operating system from malicious downloads -Prevents phishing and drive-by downloads -Filters internet content based on ratings

Protects the host operating system from malicious downloads

Which of the following BEST describes a virtual desktop infrastructure (VDI)? -Gives businesses significant control over device security while allowing employees to use their devices to access both corporate and personal data. -Defines which kinds of data are allowed or which kinds of data are prohibited on personally owned devices brought into the workplace. -Provides enhanced security and better data protection because most of the data processing is provided by servers in the data center rather than on the local device. -Specifies where and when mobile devices can be possessed within the organization. For example, the possession of mobile devices may be prohibited in high-security areas.

Provides enhanced security and better data protection because most of the data processing is provided by servers in the data center rather than on the local device.

Match the description with the appropriate cloud technology. -Public cloud -private cloud -community cloud -hybrid cloud ********************************** -Provides cloud service to just about anyone. -allows cloud services to be shared by several organizations -integrates one cloud service with other cloud services -provides cloud services to a single organization

Public cloud Provides cloud services to just about anyone. Private cloud Provides cloud services to a single organization. Community cloud Allows cloud services to be shared by several organizations. Hybrid cloud Integrates one cloud service with other cloud services.

Which of the following serves real-time applications without buffer delays? RTOS FPGA SoC SCADA

RTOS A real-time operating system (RTOS) is an operating system that serves real-time applications without buffer delays. They are generally used in systems that require a response within a strict time constraint.

Raspberry Pi

Raspberry Pi is a low-cost device the size of a credit card that's powered by the Python programming language. It's manufactured into a single system on a chip (SoC).

Which of the following app deployment and update methods allows an administrator to remove apps and clear all data from a device without affecting the device itself? Remote management Self-service portal BYOD App catalog

Remote management

Which of the following app deployment and update methods allows updates to be uploaded onto Intune where they can be pushed out to users within 24 hours? Remote management BYOD App catalog Self-service portal

Remote management

A smartphone was lost at the airport. There is no way to recover the device. Which of the following ensures data confidentiality on the device? GPS Screen lock Remote wipe TPM

Remote wipe

Mobile application management (MAM) provides the ability to do which of the following? Manage mobile devices. Remotely install and uninstall apps. Comply with security policies. Control data access.

Remotely install and uninstall apps.

Which of the following methods can cloud providers implement to provide high availability? Integration Instance awareness Replication Encryption

Replication Cloud service providers replicate data in multiple zones and within zones to provide high availability. Replication: Helps eliminate downtime (the time your data is unavailable). Redirects to another availability zone when a zone fails.

You have a development machine that contains sensitive information relative to your business. You are concerned that spyware and malware might be installed while users browse websites, which could compromise your system or pose a confidentiality risk. Which of the following actions would BEST protect your system? -Run the browser in protected mode. -Run the browser within a virtual environment. -Configure the browser to block all cookies and pop-ups. -Change the security level for the internet zone to High.

Run the browser within a virtual environment.

Which of the following devices are special computer systems that gather, analyze, and manage automated factory equipment? SCADA SoC MFD UAV

SCADA Supervisory control and data acquisition (SCADA) devices are special computer systems that gather, analyze, and manage automated factory equipment.

Supervisory control and data acquisition (SCADA)

SCADA is an industrial computer system that monitors and controls a process.

Which of the following is a disadvantage of software defined networking (SDN)? -SDN standards are still being developed. -SDN gathers network information and statistics. -SDN facilitates communication between hardware from different vendors. -SDN creates centralized management.

SDN standards are still being developed.

You are the security administrator for your organization. You have implemented a cloud service to provide features such as authentication, anti-malware, intrusion detection, and penetration testing. Which cloud service have you most likely implemented? IaaS SaaS PaaS SECaaS

SECaaS

Which of the following cloud computing solutions delivers software applications to a client either over the internet or on a local area network? DaaS PaaS SaaS IaaS

SaaS

Which of the following mobile device security considerations disables the ability to use the device after a short period of inactivity? Screen lock Remote wipe TPM GPS

Screen lock

Which of the following is a network security service that filters malware from user-side internet connections using different techniques? Cloud-based firewall Virtual area network Secure web gateway Cloud-access security broker

Secure web gateway

Which of the following do Raspberry Pi systems make use of? RTOS SoC SCADA FPGA

SoC A system on a chip (SoC) is an integrated circuit that includes all components of a typical computer system, including digital, analog, mixed-signal, and radio frequency functions. Raspberry Pi is a common device that uses an SoC. Because of their relatively low cost, SoCs are often used by hobbyists.

Virtual Switch (vSwitch)

Software that facilitates the communication between virtual machines by checking data packets before moving them to a destination.

Virtual firewall appliance(vFA)

Software that functions as a network firewall device. A virtual firewall appliance provides packet filtering and monitoring functions.

Virtual Router (vRouter)

Software that replicates the functionality of a physical router.

Cloud computing

Software, data access, computation, and storage services provided to clients through the internet.

Virtual machine monitor (VMM)/hypervisor

Software, firmware, or hardware that creates and runs virtual machines.

Network engineers have the option of using software to configure and control the network rather than relying on individual static configuration files that are located on each network device. Which of the following is a relatively new technology that allows network and security professionals to use software to manage, control, and make changes to a network? Control layer networking Software-defined networking (SDN) Infrastructure software networking Load balancing software

Software-defined networking (SDN)

Which APIs do individual networking devices use to communicate with the control plane from the Physical layer? Southbound Northbound and Southbound None Northbound

Southbound

If a user's BYOD device (such as a tablet or phone) is infected with malware, that malware can be spread if that user connects to your organization's network. One way to prevent this event is to use a Network Access Control (NAC) system. How does an NAC protect your network from being infected by a BYOD device? The NAC forces BYOD devices to connect to a guest network that is isolated from your production network. The NAC specifies which apps can be used while the BYOD device is connected to the organization's network. The NAC notifies users that personally owned devices are subject to random searches if brought on site. The NAC remediates devices before allowing them to connect to your network.

The NAC remediates devices before allowing them to connect to your network.

Software defined networking (SDN) uses a controller to manage devices. The controller is able to inventory hardware components on the network, gather network statistics, make routing decisions based on gathered data, and facilitate communication between devices from different vendors. It can also be used to make widespread configuration changes on just one device. Which of the following best describes an SDN controller? -The SDN controller is software. -The SDN controller is a networking protocol. -The SDN controller is hardware. -The SDN controller is a virtual networking device.

The SDN controller is software.

mobile application management (MAM)

The administration of applications on a mobile device. MAM software allows a system administrator to remotely install or remove organizational apps and to disable certain functions within the apps.

Mobile device management

The administration of mobile devices. MDM software generally allows for tracking devices; pushing apps and updates; managing security settings; and remotely wiping te device.

Segmentations

The division of a network into smaller networks through a virtual local area network(VLAN) and firewalls.

Sandboxing

The isolation of an app so that it can't affect other areas of a computer or network.

Internet of Things

The network of physical devices such as vehicles, home appliances, etc. that are embedded with electronics, software, sensors, actuators and connectivity that enable them to connect, collect and exchange data through the internet.

Physical machine

The physical computer with hardware, such as the hard disk drive(s), optical drive, RAM and motherboard.

Geotagging

The process of embedding GPS coordinates within mobile device files, such as image or video files created with the device's camera.

App whitelisting

The process of identifying apps that users are allowed to have on mobile devices.

Jailbreaking

The process of removing inherent protections placed by the device manufacturer.

Data exfiltration

The unauthorized copy, transfer, or retrieval of data from a computer , server or network.

The IT manager has tasked you with installing new physical machines. These computer systems are barebone systems that simply establish a remote connection to the data center to run the user's virtualized desktop. Which type of deployment model is being used? Thin client Thick client PaaS IaaS

Thin client This type of deployment is often referred to as a thin client deployment. This deployment utilizes virtual desktop infrastructure (VDI) to virtualize a user's desktop. The client machine is essentially only used to connect to the high-end machines in the data center.

Mobile device management (MDM) provides the ability to do which of the following? Control data access. Update apps as needed. Track the device. Remotely install apps.

Track the device.

Which type of hypervisor runs as an application on the host machine? Type 4 Type 2 Type 3 Type 1

Type 2 **A Type 2 hypervisor is known as a hosted hypervisor. It runs as an application on a conventional operating system. **A Type 1 hypervisor is like a thin operating system that directly interfaces with the computer hardware. *ONLY TYPE 1 &2, 3&4 DONT EXIST

Which of the following mobile device management (MDM) solutions allows an organization to manage all devices, including printers, workstations, and even IoT devices? MDM EMM UEM MAM

UEM aka... Unified endpoint management

What is the limit of virtual machines that can be connected to a virtual network? 65,534 Unlimited 54 16,777,214

Unlimited

Which formula is used to determine a cloud provider's availability percentage? Downtime/downtime + uptime Uptime/uptime + downtime Uptime/downtime + uptime Downtime/uptime + downtime

Uptime/uptime + downtime To determine the best cloud provider for your organization, compare cloud service providers' availability percentages. Availability percentage = uptime/uptime + downtime. The higher the percentage, the more resilient and reliable a provider is.

What is a virtual LAN that runs on top of a physical LAN called? VAN VLAN VFA VMM

VAN

How does virtual desktop infrastructure (VDI) provide enhanced security and better data protection?

VDI can be used to allow mobile devices to establish a remote connection to a virtualized desktop. -provides enhanced security and better data protection because most of the data processing is provided by servers in the data center rather than on the local device

Which of the following virtual devices provides packet filtering and monitoring? VFA VLAN vSwitch VMM

VFA A VFA is a virtual firewall appliance. This is software that functions as a network firewall device that provides the usual packet filtering and monitoring. A VFA can run as a traditional software firewall on a virtual machine.

Which of the following is an example of protocol-based network virtualization? VFA VLAN vSwitch VMM

VLAN VLANs and VPNs are two examples of protocol-based network virtualization.

Which of the following is used as a secure tunnel to connect two networks? VLAN VPN VFA VAN

VPN

You manage information systems for a large co-location data center. Networked environmental controls are used to manage the temperature within the data center. These controls use embedded smart technology that allows them to be managed over an internet connection using a mobile device app. You are concerned about the security of these devices. What can you do to increase their security posture? (Select two.) -Rely on the device manufacturer to maintain device security with automated firmware updates. -Verify that your network's existing security infrastructure is working properly. -Enroll each device in a mobile device management (MDM) system. -Install anti-malware software on each device. -Install the latest firmware updates from the device manufacturer.

Verify that your network's existing security infrastructure is working properly. Install the latest firmware updates from the device manufacturer. ************************* Because these devices operate in a static environment, you typically can't install third-party software on them, including anti-malware scanners or mobile device management (MDM) agents. Relying on the device manufacturer for security updates is problematic because manufacturers can be slow to take steps to protect their products against security threats. Manufacturers tend only to respond after an exploit has occurred instead of proactively defending their systems.

Virtual networks

Virtual machines and devices connected through software.

Which of the following devices facilitates communication between different virtual machines by checking data packets before moving them to a destination? Hypervisor Virtual switch Virtual router Virtual firewall

Virtual switch

Which of the following lets you make phone calls over a packet-switched network? SCADA RTOS VoIP FPGA

VoIP Voice over IP (VoIP) is a protocol optimized for the transmission of voice data (telephone calls) through a packet-switched IP network. VoIP routes phone calls through an IP network, including the internet. VoIP solutions can integrate with a public-switched telephone network (PSTN) to allow VoIP customers to make and receive external calls.

Which load balancing method distributes a workload across multiple computers? -Workload balancing -Resource pooling -Virtualization -Bottleneck

Workload balancing

Zigbee

Zigbee is a radio protocol that creates low-rate private area networks.

How do jailbreaking and sideloading differ?

jailbreaking


Conjuntos de estudio relacionados

Chapter 9: Pneumatic Actuators, Dampers, and Valves

View Set

El Examen Psiquiátrico del Paciente

View Set

Chapter 9 - Rational Emotive Behavioral Therapy

View Set