Section 3.1
Section 3.2
Section 3.2
What is a basic document that helps employees complete the same task with the same steps to ensure quality and success?
A Standard Operating Procedure (SOP) sets out the principal goals and considerations, such as budget, security, or customer contact standards, for performing a task. It also identifies lines of responsibility and authorization for performing it. You answered A service level agreement (SLA) is a contractual agreement setting out the detailed terms provided under an ongoing service.
Name the method of fault tolerance used when a group of servers, consisting of redundant nodes, prevents disruption of network services.
A cluster is a group of servers, each of which is referred to as a node, that provides redundancy and fault tolerance for critical applications. You answered Link aggregation is a method of fault tolerance that involves combining two or more separate cabled links into a single logical channel
The Chief Information Officer canceled a contract with a third-party vendor since they refused to sign a contract to limit what uses of sensitive data are permitted, what storage and distribution restrictions to enforce, and what penalties to incur for breaches of the agreement. What kind of contact did the vendor fail to sign?
A non-disclosure agreement (NDA) is the legal basis for protecting information assets. It defines what uses of sensitive data are permitted, what storage and distribution restrictions to enforce, and what penalties will incur with breaches of the agreement.
Which solution does a network closet use to clean a power signal?
A power distribution unit (PDU) has circuitry to "clean" a power signal and protect against spikes, surges, and brownouts.
A network engineer is setting up a policy to limit who has access to the terminal server and when they are allowed to access the terminal server and log any actions done on the terminal server. What policy would the network engineer best implement in this situation?
A remote access policy implements measures identified through compiling documentation. The IT department typically defines policy restrictions by users or groups, or by logging and auditing access logons and attempted logons, among others.
What is the difference between wiring diagram and floor plan?
A wiring diagram (or pin-out) shows detailed information about the termination of twisted pairs in an RJ-45 or RJ-48C jack A floor plan is a detailed diagram of wiring and port locations. For example, the IT department might use floor plans to document wall port locations and cable runs in an office.
What are audit/security logs used for?
An audit log records the use of authentication and authorization privileges. It will generally record success/fail type of events. An audit log is also known as an access log or security log.
A company has tasked a sysadmin with blocking access to company resources, including corporate email, on employees' personal cell phones. What kind of policy is the sysadmin NOT implementing regarding personal devices?
Bring Your Own Device (BYOD) is a smartphone/tablet provisioning model that allows users to select a personal device to use to interact with corporate network services and cloud apps.
A sysadmin is researching a connectivity issue. The sysadmin sees the physical link listed as up, but the line protocol listed as down. What should the sysadmin investigate to resolve the issue?
Encapsulation is the frame format expected on the interface. Encapsulation errors will prevent transmission and reception. If the sysadmin checks the interface status, the physical link will list it as up, but the line protocol will list it as down.
A company is developing a new office and has tasked the information technology department with creating a document to show where their electrical vendor needs to run electrical and internet cabling throughout the office. What kind of diagram would best accomplish this?
Floor plan diagram
A sysadmin is monitoring a server to see what is causing performance issues. The sysadmin sees high processor and memory utilization. What should the sysadmin monitor to see what is causing it?
Monitoring the input and output from the disk, as well as the amount of data being sent and received over the network can help the sysadmin identify excessive data transfer that may be contributing to the high processor and memory utilization.
Section 3.3
Section 3.3
A sysadmin is implementing a policy that establishes a duty for each employee to ensure confidentiality, integrity, and availability of data assets in the company ownership. What kind of policy is the sysadmin creating?
Security policy establishes a duty for each employee to ensure the confidentiality, integrity, and availability of any data assets or processing systems that they use as part of their job. You answered An acceptable use policy (AUP) sets out the permitted uses of a product or service. It might also state explicitly prohibited uses.