IST 220 Chapter 12 Quiz
A simple network management protocol (SNMP) trap is a
Message
All of the following are true of measuring network performance except
a good tool should have a positive effect on what it is measuring
A service level agreement (SLA) is typically an agreement between ___ and ___
a service provider; a customer
Lin is an IT networking professional for a large corporation. She is evaluating a new management system for the network. The system will track network resource use and bill various departments and units for that use. What type of management system is Lin evaluating
accounting management
A formal process of comparing measurements to one or more baselines is referred to as
an audit
Which of the following describes the need maintain secondary copies of critical data and infrastructure components
data loss prevention policy
All of the following are true of a network management system (NMS), except
due to the type of monitoring they perform, NMSs focus on wired networks only
What type of attack occurs when an attacker accesses the network between a sender and receiver
eavesdropping
true or false? a central network management system (NMS) receives SNMP agent settings from monitored devices
false
true or false? bandwidth is a measure of how long a packet takes to travel from one node to another
false
true or false? fault management is concerned mainly with the speed and integrity with which packets are delivered
false
true or false? loss prevention is the process of dismantling an asset for the value of its parts
false
true or false? network operations center (NOC) managers typically monitor infrastructure performance and overall health
false
true or false? the "P" in FCAPS stands for "physical"
false
Which of the following is a reactive rather than proactice best practice
identify the scope of the fault
Devaki is a security professional. She wants to better align IT services with organizational business requirements. She is working on an IT service catalog so that people in her company understand the specific services they can expect from the IT department. She also plans to update some of the company's IT security policies. Which of the following is the best resrouce for her consult
information technology infrastructure library (ITIL)
All of the following are characteristics of a network operations center (NOC), except
it is part of large enterprise environments only
Which of the following puts the burden of security on authentication/authorization
least privilege
A ___ is a databse of characteristics for a specific type of device
management information base (MIB)
Configuration management helps to do all of the following except
monitoring how well the network meets performance standards
Which security approach is described as a series of concentric rings around protected resoruces
multilayered defense
Which of the following describes how credentials are created and assigned for new personnel and how IR resource access is removed when any person leaves the organization
on-boarding/off-boarding procedure
Bill is an IT specialist. he has set up a variety of procedues, devices, software programs, and actions to monitor the company's hardware and software. One day, a monitoring toll detects a fault on the network. Bill locates the fault, evaluates it, and then resovles it. What is a simple way to describe what Bill has done
practiced fauly management
"Identify all single points of failure" is an example of which type of best practice
preventive measure
The purpose of which type of attack is to gather intelligence for other impending attacks
reconnaissance
The purpose of a change control board (CCB) is to
review and approve of reject configuration change requests
true or false? a benchmark is the standard to which a system is compared to determine whether it is properly configured for optimal operation
true
true or false? a network management dashboard is a collection of visual indicators that enables you to quickly see how well (or poorly) the network is functioning
true
true or false? a network management system (NMS) should look for anything out of the ordinary and take when it identifies unusual activity
true
true or false? a nondisclosure agreement (NDA) prohibits accessors of intellectual property from divulging its contents to any other entity
true
true or false? a simple network management protocol (SNMP) based system collects and processes information about network devices
true
true or false? any event that results in a violation of any CIA security property is called a security breach
true
true or false? asset management and inventory have both a financial and an operational component
true
true or false? it is a good idea to have representatives from the finance and procurement departments on a change control board
true
true or false? organizations should have an agreement privileged users sign to acknowledge and accept restrictions of what they can do
true
true or false? radio frequency (RFID) readers installed in mobile systems can inventory an entire warehouse in a matter of minutes
true
true or false? securing the perimeter means physically limiting access to the facility
true
true or false? the two main approaches to securing a network are to remove network connectivity to sensitive resources and add countermeasures to protect and sensitive resources
true
true or false? throughput is a common network performance metric
true
true or false? with a multilayered defense, attackers should encounter a chain of security controls regardless of the path they take to a resource
true