Chapter 12 Network Policies and Procedures

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

In business continuity planning, what is the primary focus of the scope? Business processes Company assets Recovery time objective Human life and safety

Business processes

Which of the following terms describes a test lab environment that does not require the use of physical hardware? VLAN Network as a service (NaaS) Virtual sandbox Offsite virtual storage

Virtual sandbox

Purchasing insurance is what type of response to risk? Rejection Acceptance Deployment of a countermeasure Transference

Transference

Which business document is a contract that defines a set of terms that will govern future agreement between two parties?

master service agreement

Which component of a change and configuration management policy specifies options for reverting a system back to the state it was in before a change was made?

roolback

Match each interoperability agreement document on the left with the appropriate description on the right.each document any be used once, more than once, or not at all.

specifies exactly which services will be performed by each party=SLA bids a vendor in an agreement to provide services on an ongoing basis=BPO provides a summary of which party is responsible for preforming specific task = MOU documents how the networks will be connected = ISA defines how disputes will be managed = SLA specifies a prest discounted pricing structure = BPO

Which business document is a contract that defines the tasks, time frame and deliverable that a vendor must perform for a client?

statement of work

Arrange the steps in the change and configuration management process on the left into correct completion order on the right.

step 1 = identify the need for a change step 2= conduct feasibility analysis step 3= define the procedure for implementing the change step 4= notify affected parties of the pending change step 5= implementing the change step 6= test the implementation step 7 = document the change

You have installed anti-virus software o computers at you business. within a few days, however, you notice that once computer ha a virus . when you question the computer user, she says she did install some software a few days ago, but it was supposed to be a file compression utility; She admits she did not scan the file running it. What should you add o your security measures to help prevent this from happening again?

user awareness training

What is the most common security policy failure?

lack of user awareness

Which of the following is an example of an internal threat? A delivery man is able to walk into a controlled area and steal a laptop. A user accidentally deletes the new product designs. A water pipe in the server room breaks. A server backdoor allows an attacker on the internet to gain access to the intranet site.

A user accidentally deletes the new product designs.

You are concerned about the amount of traffic that passed through a router on your network. You want to see how the amount of traffic has changed over time. Which document would help you identify past average network traffic? Network diagram Event log Baseline History log

Baseline

You are in the habit of regularly monitoring performance statistics for your devices. You find that this month, a specific server has averaged a higher number of active connections than last month. Which type of document should you update to reflect this change? Network diagram Configuration documentation Baseline Change log Wiring schematic

Baseline

You are troubleshooting a workstation connection to the network. During your troubleshooting, you replace the drop cable connecting the computer to the network. Which type of document should you update? Network diagram Change documentation Wiring schematic Configuration documentation

Change documentation

You plan to implement a new security device on your network. Which of the following policies outlines the process you should follow before implementing that device? SLA Acceptable use Resource allocation Change management

Change management

Which of the following network strategies connects multiple servers together so that if one server fails, the others immediately take over its tasks, preventing a disruption in service? Mirroring Clustering Adapter bonding Storage area networks (SANs)

Clustering

You want to make sure that the correct ports on a firewall are open or closed. Which document should you check? Wiring schematic Policy Baseline Configuration documentation

Configuration documentation

Which of the following is not a valid response to a risk discovered during a risk analysis? Assignment Acceptance Denial Mitigation

Denial

You manage the website for your company. The Web1 server hosts the website. This server has the following configuration: • Dual core processor • Dual power supplies • RAID 5 volume • One RAID controller • Two 1000 Mbps network adapters Which component is a single point of failure for the website? Network adapter Power supply Disk controller Disk storage

Disk controller

What is the primary goal of business continuity planning? Maintaining business operations with reduced or restricted infrastructure capabilities or resources Minimizing the risk of delays and interruptions in services Protecting an organization from major computer services failure Minimizing decision-making during the development process

Maintaining business operations with reduced or restricted infrastructure capabilities or resources

When recovery is being performed due to a disaster, which services are to be stabilized first? Mission critical Outside communications Least business critical Financial support

Mission critical

If an organization shows sufficient due care, which burden is eliminated in the event of a security breach? Negligence Investigation Liability Asset loss

Negligence

When troubleshooting a router, you want to identify which other devices are connected to the router, as well as the subnet addresses of each connected subnet. Which type of document would most likely have this information? Wiring schematic Procedure Baseline Network diagram Policy

Network diagram

A new law was recently passed that states that all businesses must keep a history of the emails sent between members of the board of directors. You need to ensure that your organization complies with this law. Which document type would you update first in response to this new law? Procedure Configuration documentation Change documentation Policy

Policy

When analyzing assets, which analysis method assigns financial values to assets? Quantitative Acceptance Qualitative Transfer

Quantitative

You need to find out what kind of laws might apply to the design and operation of your network. Which type of document would you consult? Regulation Procedure Policy Baseline

Regulation

Your company has developed and implemented countermeasures for the greatest risks to their assets. However, there is still some risk left. What is the remaining risk called? Risk Loss Residual risk Exposure

Residual risk

What is the greatest threat to theft of data in most secure organizations? USB devices Hacker intrusion Malware Operator error

USB devices

You manage a network with a single switch. All hosts connect to the network through the switch. You want to increase the security of devices that are part of the accounting department. You want to make sure that broadcast traffic sent by accounting computers is only received by other accounting computers, and you want to implement ACLs to control traffic sent to accounting computers through the network. What should you do? Use a router to configure a subnet for the accounting computers. Configure a VLAN on the switch for the accounting computers. Implement NAC with 802.1x authentication for the accounting computers. Configure MAC address filtering on the switch for the accounting computers.

Use a router to configure a subnet for the accounting computers.

You manage a website for your company. The website uses three servers configured in a cluster. Incoming requests are distributed automatically between the three servers. All servers use a shared storage device that holds the website contents. Each server has a single network connection and a single power supply. Considering the availability of your website, which component represents a single point of failure? Power supply Website storage Network adapter Web server

Website storage

When is choosing to do nothing about an identified risk acceptable? When the cost of protecting the asset is greater than the potential loss. When the threat is most likely to come from an internal source instead of an external source. When the threat is likely to occur less than once a year. When the asset is an intangible asset instead of a tangible asset.

When the cost of protecting the asset is greater than the potential loss.

Which of the following documents would likely identify that drop cables on your network use the T568A standard? Baseline Wiring schematic Policy Network diagram Change log

Wiring schematic

Which type of documentation would you consult to find the location of RJ45 wall jacks and their endpoints in the intermediate distribution closet? Policy Procedure Baseline Wiring schematic

Wiring schematic

You are troubleshooting a workstation connection to the network. During your troubleshooting, you move the cable in the wiring closet to a different port on the patch panel. Which type of document should you update? Logical network diagram Wiring schematic Procedure Baseline

Wiring schematic

You are troubleshooting the connection of a computer in an office to the punch down block in the distribution closet. Which document would you consult to identify the termination of the cable on the punch down block based on the wall jack location in the office? Logical network diagram Regulation Procedure Wiring schematic

Wiring schematic

Which of the ff defines an acceptable use agreement?

an agreement that identifies the employee's rights to use company property, such as internet access and computer equipment, for personal use

Which of the ff are typically associated with human resources security policies? Select two

background check termination

Which components of a change configuration management policy identifies the need for a proposed change?

change request

A code of ethics accomplishes all bu which of the following?

clearly defines courses of action to take when a complex issue is encountered

Match each third-party integration phase on the left with the task that need to be completed during that phase on the right. each may be used ,more than once or not at all

communicate vulnerability assessment findings with other party = ongoing operation disable VPN configurations that allow partner access to your network=off-boarding compare your organizations security policies with the partner's policies= onboarding disable the domain trust relationship between networks=off boarding identify how privacy will be protected= onboarding draft an ISA= onboarding conduct regular security audits=ongoing operations

Your organization entered into an interoperability agreement(IA) with another organization a year ago.as a part of this agreement, a federated trust was established between your domain and the partner domain The partnership has been in the ongoing operations phase for almost nine months . as security administrator , which tasks should you complete during this phase? Select two

conduct periodic vulnerability assessment verify compliance with the IA documents

Which component of a change and configuration management policy identifies technical and budgetary considerations associated with a proposed change and also identifies any potential impacts to the network?

feasibility analysis

Your organization is in the process of negotiating an interoperability agreement (IA) with another organisation. as a part of this agreement, the partner organization proposes that a federated trust be established between your domain and their domain. this configuration will allow user in their domain to access resources in your domain and vice versa. As a security administrator , which task should u complete during this phase? Select two

identify how data ownership will be determined identify how data will be shared


Ensembles d'études connexes

Security+ Chapter 14: Incident Response

View Set

41 Manipulation Tactics to Look Out For

View Set

RealEstateU- Texas Promulgated Contract Forms

View Set

Factoring Polynomials, Adding, Subtracting, and Multiplying Polynomials

View Set