SLOA 3 Review
In business continuity planning, what is the primary focus of the scope?
Business processes
Your network uses the following backup strategy. You create: Full backups every Sunday night. Incremental backups Monday night through Saturday night. On a Thursday morning, the storage system fails. How many restore operations would you need to perform to recover all of the data?
Four
Your disaster recovery plan (DRP) calls for backup media to be stored at a different location. The location is a safe deposit box at the local bank. Because of this, the disaster recovery plan specifies that you must choose a method that uses the least amount of backup media but also allows you to quickly back up and restore files. Which backup strategy would BEST meet the DRP's specifications?
Perform a full backup once per week and a differential backup the other days of the week.
What is WindowsUpdate.log?
A log or record of all notable changes made to a Windows system.
Which of the following pieces of information are you MOST likely to find in a policy document?
A requirement for using encrypted communications for web transactions
Which of the following describe a system image backup?
A system image contains everything on the system volume, including the operating system, installed programs, drivers, and user data files.
Which of the following defines an Acceptable Use Agreement?
An agreement that identifies the employees' rights to use company property, such as internet access and computer equipment, for personal use
Some users report that frequent system crashes have started happening on their workstations. Upon further investigation, you notice that these users all have received a recent update to the same application. Where would you go to conduct a root cause analysis?
Application log
What is the primary purpose of RADIUS?
Authenticate remote clients before access to the network is granted.
Where can you check your CPU's temperature?
BIOS
Which of the following ports does TACACS use?
49
You have a Windows 10 system. You have used the Settings app to access Windows Update. From this location, how long can you pause updates?
7 days
Which of the following is true about a community string?
A community string identifies devices under the same administrative control.
Which of the following is true about processor performance?
A healthy system's CPU utilization should average around 40%
You want to make sure that the correct ports on a firewall are open or closed. Which document should you check?
Baseline configurations
Which of the following is the term for when a system is unable to keep up with the demands placed on it?
Bottleneck
You plan to implement a new security device on your network. Which of the following policies outlines the process you should follow before you implement that device?
Change Management
What does SNMP use to identify a group of devices under the same administrative control?
Community strings
For users on your network, you want to automatically lock user accounts if four incorrect passwords are used within 10 minutes. What should you do?
Configure account lockout policies in Group Policy
You want to make sure that all users have passwords over eight characters in length and that passwords must be changed every 30 days. What should you do?
Configure account policies in Group Policy.
You manage your company's website, which uses a cluster of two servers with a single shared storage device. The shared storage device uses a RAID 1 configuration. Each server has a single connection to the shared storage and a single connection to your ISP. You want to provide redundancy so that a failure on a single component doesn't cause the website to become unavailable. What should you add to your configuration to accomplish this?
Connect one server to the internet through a different ISP.
You manage a single domain named widgets.com. Organizational units (OUs) have been created for each company department. User and computer accounts have been moved into their corresponding OUs. Members of the Directors OU want to enforce longer passwords than are required for the rest of the users. You define a new granular password policy with the required settings. All users in the Directors OU are currently members of the DirectorsGG group, which is a global security group in that OU. You apply the new password policy to that group. Matt Barnes is the chief financial officer, and he would like his account to have even stricter password policies than are required for other members in the Directors OU. What should you do?
Create a granular password policy for Matt. Apply the new policy directly to Matt's user account.
Which backup strategy backs up all files from a computer's file system (regardless of whether the file's archive bit is set or not) and then marks them as backed up?
Full
Your Windows system is a member of a domain. Windows Update settings are being controlled through Group Policy. How can you determine whether a specific security update from Windows Update is installed on the computer?
Go to Programs and Features in Control Panel.
You suspect that cache poisoning or spoofing has occurred on your network. Users are complaining of strange web results and being redirected to undesirable sites. Which log would help you determine what's going on?
DNS logs
What does the Windows Update Delivery Optimization function do?
Delivery Optimization provides you with Windows and Store app updates and other Microsoft products.
Which of the following information are you MOST likely to find in a procedure document?
Details on how to test and deploy patches
Which of the following is a best practice when establishing a baseline?
Determine baselines over time by analyzing network traffic.
Which backup strategy backs up only files that have the archive bit set and does not mark them?
Differential
You suspect that a bad video driver is causing a user's system to randomly crash and reboot. Where would you go to identify and confirm your suspicions?
Dump files
Which of the following is a characteristic of TACACS+?
Encrypts the entire packet, not just authentication packets.
Which of the following is the term for a calculation of how often bits are damaged in transit due to electromagnetic interference?
Error rate
A web server on your network hosts your company's public website. You want to make sure that a NIC failure on the server does not prevent the website from being accessible on the internet. Which solution should you implement?
Ethernet bonding
Listen to exam instructions Which of the following provides a layout of all electrical, plumbing, HVAC, and networking wiring and components?
Floor plan
Which of the following provides information on the subnets within your network, including the subnet addresses and the routers connecting each subnet?
Network diagram
You manage a single domain named widgets.com. Organizational units (OUs) have been created for each company department. User and computer accounts have been moved into their corresponding OUs. You define a password and account lockout policy for the domain. However, members of the Directors OU want to enforce longer passwords than are required for the rest of the users. You need to make the change as easily as possible. Which of the following actions should you take?
Implement a granular password policy for the users in the Directors OU.
You have been using SNMP on your network for monitoring and management, but you're concerned about the security of this configuration. What should you do to increase security in this situation?
Implement version 3 of SNMP
Which of the following does an agent send to the manager to confirm the receipt of a transmission?
Inform
Dan wants to implement reconnaissance countermeasures to help protect his DNS service. Which of the following actions should he take?
Install patches against known vulnerabilities and clean up out-of-date zones, files, users, and groups.
Listen to exam instructions You have purchased a solar backup power device to provide temporary electrical power to critical systems in your data center should the power provided by the electrical utility company go out. The solar panel array captures sunlight, converts it into direct current (DC), and stores it in large batteries. The power supplies on the servers, switches, and routers in your data center require alternating current (AC) to operate. Which electrical device should you implement to convert the DC power stored in the batteries into AC power that can be used in the data center?
Inverter
When packets arrive at their destination at different speeds, they sometimes arrive out of order. What does this cause?
Jitter
Which Syslog level indicates an emergency that could severely impact the system and cause it to become unusable?
Level 0
Which Syslog severity level indicates a debugging message?
Level 7
Which of the following devices accepts incoming client requests and distributes those requests to specific servers?
Load balancer
What is the name of the computer that queries agents and gathers responses by sending messages?
Manager
You are adding a new rack to your data center, which will house two new blade servers and a new switch. The new servers will be used for virtualization. The only space you have available in the data center is on the opposite side of the room from your existing rack, which already houses several servers, a switch, and a router. You plan to configure a trunk port on each switch and connect them with a straight-through UTP cable that will run across the floor of the data center. To protect equipment from power failures, you also plan to install a UPS on the rack along with redundant power supplies for the server. Will this configuration work?
No, you should not run a cable across the data center floor.
Which of the following is a contract in which both parties agree not to share proprietary or confidential information gathered during the business relationship?
Non-Disclosure Agreement
Your network performs a full backup every night. Each Sunday, the previous night's backup tape is archived. On a Wednesday morning, the storage system fails. How many restore operations would you need to perform to recover all of the data
One
Which of the following are backed up during a differential backup?
Only files that have changed since the last full backup.
Which of the following are backed up during an incremental backup?
Only files that have changed since the last full or incremental backup.
Which of the following authentication protocols transmits passwords in cleartext and is considered too unsecure for modern networks?
PAP
Which of the following security functions does CHAP perform?
Periodically verifies the identity of a peer using a three-way handshake.
Which of the following are differences between RADIUS and TACACS+?
RADIUS combines authentication and authorization into a single function, while TACACS+ allows these services to be split between different servers.
In addition to performing regular backups, what must you do to protect your system from data loss?
Regularly test restoration procedures.
You often travel away from the office. While traveling, you would like to use a modem on your laptop computer to connect directly to a server in your office to access needed files. You want the connection to be as secure as possible. Which type of connection do you need?
Remote access
What does a remote access server use for authorization?
Remote access policies
Of the following restoration processes, which would result in the fastest restoration of all data if a system failure occurred on Friday?
Restore the full backup from Sunday and the last differential backup.
Because of an unexplained slowdown on your network, you decide to install monitoring software on several key network hosts to locate the problem. You will then collect and analyze the data from a central network host. Which protocol will the software use to detect the problem?
SNMP
When an event occurs, the agent logs details regarding the event. What is this event called?
Trap
Which protocol uses traps to send notifications from network devices?
SNMP
Which of the following is the least effective power loss protection for computer systems?
Surge Protector
Which of the following is a standard for sending log messages to a central logging server?
Syslog
Over the past few days, a server has gone offline and rebooted automatically several times. You would like to see a record of when each of these restarts occurred. Which log type should you check?
System
What is the definition of bandwidth?
The amount of data that can be transferred from one place to another in a specific amount of time.
Which of the following could be to blame if your computer is regularly crashing or restarting?
The processor is too hot.
What is the definition of latency?
The speed at which data packets travel from source to destination and back.
Why should you store backup media off site?
To prevent the same disaster from affecting both the network and the backup media
Your network uses the following backup strategy. You create: Full backups every Sunday night. Differential backups Monday night through Saturday night. On Thursday morning, the storage system fails. How many restore operations would you need to perform to recover all of the data?
Two
Your computer seems to be running slowly. In particular, you notice that the hard drive activity light remains lit when you run multiple applications and switch between open windows. This happens even though you aren't saving large files. What should you do to troubleshoot the problem?
Use Resource Monitor to monitor memory utilization.
You are the network administrator for a growing business. When you were hired, the organization was small, and only a single switch and router were required to support your users. During this time, you monitored log messages from your router and switch directly from each device's console. The organization has grown considerably in recent months. Now you manage eight individual switches and three routers. It's becoming more and more difficult to monitor these devices and stay on top of issues in a timely manner. What should you do?
Use Syslog to implement centralized logging.
You are concerned that an attacker can gain access to your web server, make modifications to the system, and alter the log files to hide his or her actions. Which of the following actions would BEST protect the log files?
Use Syslog to send log entries to another server.
You have just configured the password policy and set the minimum password age to 10. What is the effect of this configuration?
Users cannot change the password for 10 days.
Which SNMP component uses GETNEXT messages to navigate the MIB structure?
Walk
Which log file type is one of the most tedious to parse but can tell you exactly when a user logged onto your site and what their location was?
Web server logs
While deploying Windows updates, when would you use the critical update ring?
When deploying updates to important systems (only after the update has been vetted).
When deploying Windows updates, when would you use the preview update ring?
When deploying updates to users that want to stay on top of changes.
Windows Update for Business (WUfB) lets you keep your devices current with the latest security upgrades and features. Which operating system releases does WUfB support?
Windows 10
Which type of documentation would you consult to find the location of RJ45 wall jacks and their endpoints in the intermediate distribution closet?
Wiring schematic
You have performed an audit and found an active account for an employee with the username joer. This user no longer works for the company. Which command can you use to disable this account?
usermod -L joer