Chapter 1 Practice Exam

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Which type of virtualization allows a computer's operating system kernel to run multiple isolated instances of a guest virtual machine, with each guest sharing the kernel? A. Container Virtualization B. Type I hypervisor virtualization C. Type II hypervisor virtualization D. VDE

A. Container Virtualization

You are preparing to deploy a new application on a virtual server the virtual server hosts another server application that employees routinely access. Which of the following is the BEST method to use when deploying the new application? A. Take a snapshot of the VM before deploying the new application. B. Take a snapshot of the VM after deploying the new application. C. Ensure the server is configured for non-persistence. D. Back up the server after installing the new application.

A. Take a snapshot of the VM before deploying the new application.

Users within your organization access virtual desktops hosted on remote servers. This describes which of the following? A. VDE. B. Snapshots for non-persistence. C. Type I hypervisors. D. VM sprawl.

A. VDE.

Ned is not able to access any network resources from his Linux-based computer. Which of the following commands would he use to view the network configuration of his system? A. ifconfig B. ipconfig C. netstat D. tracert

A. ifconfig

Your organization wants to reduce the amount of money it is losing due to thefts. Which of the following is the BEST example of an equipment theft deterrent? A. Snapshots B. Cable Locks C. Strong Passwords D. Persistent VDI

B. Cable Locks

You need to transfer PII via email and you want to maintain its confidentiality. Which of the following choices is the BEST solution? A. Use hashes. B. Encrypt it before sending. C. Protect it with a digital signature. D. Use RAID.

B. Encrypt it before sending. You can maintain confidentiality of any data, including Personally Identifiable Information (PII) with encryption. Hashes provide integrity, not confidentiality. A digital signature provides authentication, non-repudiation, and integrity. A redundant array of inexpensive disks (RAID) provides higher availability for a disk subsystem.

Apu manages network devices in his store and maintains copies of the configuration files for all the managed routers and switches. On a weekly basis, he creates hashes for these files and compares them with hashes he created on the same files the previous week. Which of the following use cases is he MOST likely using? A. Supporting confidentiality. B. Supporting integrity. C. Supporting encryption. D. Supporting availability.

B. Supporting integrity. He is most likely using a use case of supporting integrity. By verifying that the hashes are the same on the configuration files, he is verifying that the files have not changed. Confidentiality is enforced with encryption, access controls, and steganography. Encryption is a method of enforcing confidentiality and it doesn't use hashes. Availability ensures systems are up and operational when needed.

As the CTO, Marge is implementing a security program. She has included security controls to address confidentiality and availability. Of the following choices, what else should she include? A. Ensure critical systems provide uninterrupted service. B. Protect data-in-transit from unauthorized disclosure. C. Ensure systems are not susceptible to unauthorized changes. D. Secure data to prevent unauthorized disclosure.

C. Ensure systems are not susceptible to unauthorized changes.

Your organization has implemented VDI for most users. When a user logs off, the desktop reverts to its original state without saving any changes made by the user. Which of the following BEST describes this behavior? A. Container virtualization B. VM escape C. Non-persistence D. Elasticity

C. Non-persistence

Administrators frequently create VMs for testing. They sometimes leave these running without using them again after they complete their test. which of the following does this describe? A. VM escape B. VDI snapshot C. VM sprawl D. Type II hypervisor

C. VM sprawl

Your organization is considering virtualizing solutions. Management wants to ensure that any solution provides the best ROI. Which of the following solutions indicates that virtualization would provide the best ROI? A. Most physical servers within the organization are currently utilized to 100%. B. The organization has many servers that do not require failover service. C. Most desktop PCs require fast processors and high amounts of memory. D. Most physical servers within the organization are currently underutilized.

D. Most physical servers within the organization are currently underutilized.

Management has mandated the use of digital signatures by all personnel within your organization. Which of the following use cases does this primarily support. A. Supporting confidentiality B. Supporting availability C. Supporting obfuscation D. Supporting non-repudiation

D. Supporting non-repudiation

Louie hid several plaintext documents within an image file. He then sent the image file to Tony. which of the following BEST describes the purpose of his actions? A. To support steganography. B. To support integrity. C. To support availability. D. To support obfuscation.

D. To support obfuscation. Hiding data within data is one way to support a use case of supporting obfuscation. In this scenario, Louie is using steganography to hide the files within the image, but that is the method, not the purpose. Hashing methods and digital signatures support integrity. Redundancy and fault-tolerance methods increase availability.

You are considering rebooting a database server and want to identify if it has any active network connections. Which of the following commands will list active network connections? A. arp B. ipconfig C. ping D. netstat

D. netstat

You have configured a firewall in your network to block ICMP traffic. You want to verify that it is blocking this traffic. Which of the following commands would you use? A. arp B. ipconfig C. netstat D. ping

D. ping The ping command sends Internet Control Message Protocol (ICMP) echo request and check for ICMP echo replies. Arp resolves IP addresses to media access control (MAC) addresses and does not use echo commands. Ipconfig checks the configuration of a NIC. Netstat shows active connections and network statistics.


Ensembles d'études connexes

CH. 10 Consumer Behavior, Ch. 9 Consumer Behavior, Ch. 8 Consumer Behavior, Ch. 7 Consumer Behavior, Ch. 13 Consumer Behavior, Ch. 12 Consumer Behavior, 153 Final Exam

View Set

US History Regents Vocab: Federal Home Loan Bank Act - Fifteenth Amendment

View Set

University of Kansas Biology 100 Test 4 Class 16 Study Guide

View Set

🐧Linux Server 1: Chapter 3 QUIZ

View Set

[Science]: Electricity & Magnetism: Electric Charge and Static Electricity (Student Teacher's Notes)

View Set

Biology Midterm III PRS Clicker Questions

View Set