Network Policies and Procedures

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

In business continuity planning, what is the primary focus of the scope?

Business processes

An agreement that identifies the employee's rights to use company property, such as internet access and computer equipment, for personal use.

Conduct periodic vulnerability assessments. Verify compliance with the IA documents.

Which business document is a contract that defines a set of terms that will govern future agreements between two parties?

MSA

What is the primary goal of business continuity planning?

Maintaining business operations with reduced or restricted infrastructure capabilities or resources

Match each interoperability agreement document on the left with the appropriate description on the right. Each document may be used once, more than once, or not at all.

Specifies exactly which services will be performed by each party: SLA Binds a vendor in an agreement to provide services on an ongoing basis: BPO Provides a summary of which party is responsible for performing specific tasks: MOU Documents how the networks will be connected: ISA Defines how disputes will be managed: SLA Specifies a preset discounted pricing structure: BPO

Purchasing insurance is what type of response to risk?

Transference

Which of the following terms describes a test lab environment that does not require the use of physical hardware?

Virtual sandbox

Which of the following is an example of an internal threat?

A user accidentally deletes the new product designs.

Which of the following defines an acceptable use agreement?

An agreement that identifies the employee's rights to use company property, such as internet access and computer equipment, for personal use.

Which of the following are typically associated with human resource security policies? (Select two.)

Background checks Termination

You are concerned about the amount of traffic that passed through a router on your network. You want to see how the amount of traffic has changed over time. Which document would help you identify past average network traffic?

Baseline

You are in the habit of regularly monitoring performance statistics for your devices. You find that this month, a specific server has averaged a higher number of active connections than last month. Which type of document should you update to reflect this change?

Baseline

You are troubleshooting a workstation connection to the network. During your troubleshooting, you replace the drop cable connecting the computer to the network. Which type of document should you update?

Change document

You plan to implement a new security device on your network. Which of the following policies outlines the process you should follow before implementing that device?

Change management

Which component of a change and configuration management policy identifies the need for a proposed change?

Change request

A code of ethics accomplishes all but which of the following?

Clearly defines courses of action to take when a complex issue is encountered

Which of the following network strategies connects multiple servers together so that if one server fails, the others immediately take over its tasks, preventing a disruption in service?

Clustering

Match each third-party integration phase on the left with the tasks that need to be completed during that phase on the right. Each phase may be used once, more than once, or not at all.

Communicate vulnerability assessment findings with the other party: Ongoing operations Disable VPN configurations that allow partner access to your network: Off-boarding Compare your organization's security policies with the partner's policies: Onboarding Disable the domain trust relationship between networks: Off-boarding Identify how privacy will be protected: Onboarding Draft an ISA: Onboarding Conduct regular security audits: Ongoing operations

You want to make sure that the correct ports on a firewall are open or closed. Which document should you check?

Configuration doc

Which of the following is not a valid response to a risk discovered during a risk analysis?

Denial

You manage the website for your company. The Web1 server hosts the website. This server has the following configuration: Dual core processor Dual power supplies RAID 5 volume One RAID controller Two 1000 Mbps network adapters Which component is a single point of failure for the website?

Disk controller

Which component of a change and configuration management policy identifies technical and budgetary considerations associated with a proposed change and also identifies any potential impacts to the network?

Feasibility analysis

Your organization is in the process of negotiating an interoperability agreement (IA) with another organization. As a part of this agreement, the partner organization proposes that a federated trust be established between your domain and their domain. This configuration will allow users in their domain to access resources in your domain and vice versa. As a security administrator, which tasks should you complete during this phase? (Select two.)

Identify how data ownership will be determined Identify how data will be shared

What is the most common security policy failure?

Lack of user awareness

When recovery is being performed due to a disaster, which services are to be stabilized first?

Mission critical

If an organization shows sufficient due care, which burden is eliminated in the event of a security breach?

Negligence

When troubleshooting a router, you want to identify which other devices are connected to the router, as well as the subnet addresses of each connected subnet. Which type of document would most likely have this information?

Network diagram

A new law was recently passed that states that all businesses must keep a history of the emails sent between members of the board of directors. You need to ensure that your organization complies with this law. Which document type would you update first in response to this new law?

Policy

When analyzing assets, which analysis method assigns financial values to assets?

Quantitative

You need to find out what kind of laws might apply to the design and operation of your network. Which type of document would you consult?

Regulation

Your company has developed and implemented countermeasures for the greatest risks to their assets. However, there is still some risk left. What is the remaining risk called?

Residual risk

Which component of a change and configuration management policy specifies options for reverting a system back to the state it was in before a change was made?

Rollback

Which business document is a contract that defines the tasks, time frame, and deliverables that a vendor must perform for a client?

Statement of work

Arrange the steps in the change and configuration management process on the left into correct completion order on the right.

Step 1: Identify the need for a change. Step 2: Conduct a feasibility analysis. Step 3: Define the procedure for implementing the change. Step 4: Notify affected parties of the pending change. Step 5: Implement the change. Step 6: Test the implementation. Step 7: Document the change.

What is the greatest threat to theft of data in most secure organizations?

USB devices

You manage a network with a single switch. All hosts connect to the network through the switch. You want to increase the security of devices that are part of the accounting department. You want to make sure that broadcast traffic sent by accounting computers is only received by other accounting computers, and you want to implement ACLs to control traffic sent to and between accounting computers through the network. Which of the following is the BEST solution?

Use a router to configure a subnet for the accounting computers

You have installed anti-virus software on computers at your business. Within a few days, however, you notice that one computer has a virus. When you question the computer's user, she says she did install some software a few days ago, but it was supposed to be a file compression utility. She admits she did not scan the file before running it. What should you add to your security measures to help prevent this from happening again?

User awareness training

You manage a website for your company. The website uses three servers configured in a cluster. Incoming requests are distributed automatically between the three servers. All servers use a shared storage device that holds the website contents. Each server has a single network connection and a single power supply. Considering the availability of your website, which component represents a single point of failure?

Website storage

When is choosing to do nothing about an identified risk acceptable?

When the cost of protecting the asset is greater than the potential loss.

Which of the following documents would likely identify that drop cables on your network use the T568A standard?

Wiring schematic

Which type of documentation would you consult to find the location of RJ45 wall jacks and their endpoints in the intermediate distribution closet?

Wiring schematic

You are troubleshooting a workstation connection to the network. During your troubleshooting, you move the cable in the wiring closet to a different port on the patch panel. Which type of document should you update?

Wiring schematic

You are troubleshooting the connection of a computer in an office to the punch down block in the distribution closet. Which document would you consult to identify the termination of the cable on the punch down block based on the wall jack location in the office?

Wiring schematic


Kaugnay na mga set ng pag-aaral

Personal Financial Planning (4 questions WRONG!)

View Set

Ch. 18 Outcome Based Questions The Urinary System

View Set

Chapter 7 - Muscles of the Forearm and Hand

View Set

Personal Finance Chapter 1 Review

View Set

Insect Bites, Stings, Pediculosis and Podiatry anki cards

View Set