Network Compass 16

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

In active-passive configuration, network traffic is distributed across: -All network infrastructure devices -Network infrastructure devices marked as active -Least utilized network infrastructure devices -Network infrastructure devices marked as passive

-Network infrastructure devices marked as active

In active-active configuration, network traffic is distributed across: -Least utilized network infrastructure devices -None of the network infrastructure devices -All designated network infrastructure devices -Most utilized network infrastructure devices

All designated network infrastructure devices

Which of the following power redundancy solutions would be best suited for providing long-term emergency power during an unexpected main power source outage? Dual-power supply Standby UPS Backup generator Managed PDU

Backup generator

Which of the following answers refers to a vulnerability database? DBA CVE DBaaS AIS

CVE

Which alternate site is the least expensive to implement? Cold site Warm site Hot site Cloud site

Cloud site

Which of the following backup facilities does not require physical infrastructure? Cold site Warm site Hot site Cloud site

Cloud site

A disaster recovery facility that provides only the physical space for recovery operations is called: Hot site Cloud site Warm site Cold site

Cold site

Which of the security measures listed below would be effective against the malicious insider threat? (Select 3 answers) DLP system Principle of least privilege Time-of-day restrictions Strong authentication Usage auditing and review

DLP system Principle of least privilege Usage auditing and review

Which of the following terms refer to the concept of confidentiality? (Select 3 answers) Fault tolerance Encryption Non-repudiation Access control methods Steganography Redundancy Patch management Hashing Load balancing

Encryption Access control methods Steganography

High MTBF value indicates that a component or system provides low reliability and is more likely to fail. True False

False

Which of the following terms refer(s) to the concept of integrity? (Select all that apply) Steganography Hashing Digital signatures Encryption Digital certificates Redundancy Non-repudiation Access control methods Fault tolerance

Hashing Digital signatures Digital certificates Non-repudiation

Which alternate site allows for fastest disaster recovery? Cold site Hot site Warm site

Hot site

Which of the following violates the principle of least privilege? Onboarding process Improperly configured accounts Shared accounts for privileged users Time-of-day restrictions

Improperly configured accounts

Which term best describes a disgruntled employee abusing legitimate access to company's internal resources? Script kiddie Insider threat Hacktivist Blue hat hacker

Insider threat

Which of the following terms is used to describe an average time required to repair a failed component or device? MTBF RPO MTTR SLA

MTTR

Which of the following answers refers to a device designed to supply (and monitor the quality of) electric power to multiple outlets? PSU MDF PDU IDF

PDU

In Business Continuity Planning (BCP), the maximum tolerable point in time to which systems and data must be recovered after an outage is called: RPO MTBF RTO MTTR

RPO

Which of the acronyms listed below refers to a maximum tolerable period of time required for restoring business functions after a failure or disaster? SLA RTO AUP RPO

RTO

Which of the following terms refer(s) to the concept of availability? (Select all that apply) Redundancy Fault tolerance Non-repudiation Hashing Load balancing Patch management Digital certificates Encryption Access control methods

Redundancy Fault tolerance Load balancing Patch management

The term "CIA triad" is used to describe the basic principles of information security. True False

True

Which of the following statements does not match a typical description of nation states or state-funded groups identified as threat actors? Political or economic motivation High level of technical sophistication Advanced Persistent Threat (APT) High level of resources/funding Typically classified as an internal threat

Typically classified as an internal threat

Which of the following networking protocols provide(s) redundancy? (Select all that apply) DSCP VRRP IS-IS FHRP EIGRP

VRRP FHRP

Which of the protocols listed below enable(s) designating a backup router in the event of an active router failure? (Select all that apply) DSCP VRRP IS-IS HSRP EIGRP

VRRP HSRP

An alternate site that typically provides only the hardware infrastructure is referred to as a: Cold site Hot site Cloud site Warm site

Warm site

A type of attack aimed at exploiting vulnerability that is present in already released software but unknown to the software developer is called: Xmas attack Zero-day attack IV attack Replay attack

Zero-day attack


Ensembles d'études connexes

NFPA 13 Occupancy Hazard Classifications

View Set

Civil Rights and Liberties Study Guide

View Set

American Red Cross Lifeguard TEST

View Set

ATI MH Pharm Antianxiety & Antidepressants

View Set