Security+ 2.5 Cybersecurity Resilience
A database backup schedule consists of weekly full backups performed on Saturday at 12:00 a.m. and daily incremental backups also performed at 12:00 a.m. If the database is restored on Wednesday afternoon, which of the following is the number of individual backups that would need to be applied to complete the database recovery? A. 2 B. 3 C. 1 D. 4
4
These are devices that distribute electrical power among devices. A. uninterruptible power supply (UPS) B. managed power distribution units (PDUs) C. dual supply D. generator
managed power distribution units (PDUs)
This is when we combine several physical NICs into one logical NIC. A. network interface card (NIC) teaming B. round robin C. uninterruptible power supply (UPS) D. managed power distribution units (PDUs)
network interface card (NIC) teaming
This is a dedicated data storage server that is accessible over a network. It has file-level access to data storage. A. network-attached storage (NAS) B. hard disk drives (HDDs) C. storage area network (SAN) D. tape drives
network-attached storage (NAS)
This is when we restore a device to a previous secure condition. We take the computer and data back to a previous point in time. A. revert to known state B. rollback to last known good configuration C. live boot media D. persistence
rollback to last known good configuration
What kind of load balancer scheduling sends each new request to a different server in order? Once all servers are sent a new request, the next request is sent to the first server again. A. active-passive B. round robin C. active-active D. affinity
round robin
This is a network that provides access to storage devices. It has block-level access to data storage. A. network-attached storage (NAS) B. tape drives C. storage area network (SAN) D. hard disk drives (HDDs)
storage area network (SAN)
The most common backup media has been _____, as it is cheaper and stores more data than other media. A. storage area network (SAN) B. hard disk drives (HDDs) C. tape drives D. network-attached storage (NAS)
tape drives
This is a temporary power source for computer devices when the power goes out. A. managed power distribution units (PDUs) B. network interface card (NIC) teaming C. uninterruptible power supply (UPS) D. generator
uninterruptible power supply (UPS)
A database backup schedule consists of weekly full backups performed on Saturday at 12:00 a.m. and daily differential backups also performed at 12:00 a.m. If the database is restored on Wednesday afternoon, which of the following is the number of individual backups that would need to be applied to complete the database recovery? A. 3 B. 1 C. 4 D. 2
2
A database backup schedule consists of weekly full backups performed on Saturday at 12:00 a.m. and daily incremental backups also performed at 12:00 a.m. If the database is restored on Tuesday afternoon, which of the following is the number of individual backups that would need to be applied to complete the database recovery? A. 2 B. 3 C. 1 D. 4
3
This is when systems are up and running when needed. A. Scalability B. Fault tolerance C. Availability D. Multipathing
Availability
_____ uses different security control types to strengthen security. A. control diversity B. vendor diversity C. layered security D. crypto diversity
Control diversity
_____ is the fact that data is subject to the laws of the country where it is stored. A. Network interface card (NIC) teaming B. Uninterruptible power supply (UPS) C. Off-site backups D. Data sovereignty
Data sovereignty
A/an _____ backs up all files that were changed since the last full backup. The archive bit is NOT cleared afterwards. A. Full backup B. Snapshot backup C. Incremental backup D. Differential backup
Differential backup
This is when we have a second power supply that can also power the device if the primary power supply fails. A. uninterruptible power supply (UPS) B. managed power distribution units (PDUs) C. generator D. dual supply
dual supply
This is a device that creates electricity for long-term power outages. A. uninterruptible power supply (UPS) B. managed power distribution units (PDUs) C. network interface card (NIC) teaming D. generator
generator
A/an _____ backs up all files. The archive bit gets cleared afterward. A. Full backup B. Differential backup C. Incremental backup D. Snapshot backup
Full backup
Which type of backup has the slowest backup time? A. Differential backup B. Incremental backup C. Full backup D. Disk backup
Full backup
Which type of backup has the fastest backup time? A. Archive bit B. Full backup C. Differential backup D. Incremental backup
Incremental backup
What device can evenly spread the data load across multiple computers or networks? A. Load balancer B. XOR C. Multipathing D. RAID
Load balancer
This is when we create more than one path in a network, in case one part of the network were to fail. A. Multipathing B. XOR C. RAID D. Load balancer
Multipathing
What is a way to protect your data against disasters such as fires or floods? A. Off-site backups B. Load balancers C. Data sovereignty D. Redundant array of inexpensive disks (RAID)
Off-site backups
_____ is the sequence in which different systems are reinstated after a disaster has occurred. A. High availability (HA) B. Order of restoration C. Off-site backups D. Data sovereignty
Order of restoration
_____ uses multiple disk drives for data storage to improve redundancy and performance. Which of the following BEST describes this? A. High availability (HA) B. RAID C. Fault tolerance D. Snapshot backup
RAID
For this type of RAID, two copies of data are written to two drives. A. RAID 6: striping with two parity blocks B. RAID 0: striping C. RAID 1: mirroring D. RAID 5: striping with distributed parity
RAID 1: mirroring
For this type of RAID, the exclusive or (XOR) operation is used to reconstruct data after one disk failure. A. RAID 1+0: striping with a mirror B. RAID 5: striping with distributed parity C. RAID 1: mirroring D. RAID 0: striping
RAID 5: striping with distributed parity
This is the use of duplicated equipment to improve the availability of a system. A. Accounting B. Redundancy C. Confidentiality D. Integrity
Redundancy
This is when a device or system can handle increases in traffic without decrease in performance . A. Multipathing B. Fault tolerance C. Scalability D. Availability
Scalability
A/an _____ captures all the data on a VM (virtual machine) at a specific date and time. A. Differential backup B. Incremental backup C. Full backup D. Snapshot backup
Snapshot backup
This backup media has a large storage capability and can use data compression to save space. Prices have been coming down in recent years. A. storage area network (SAN) B. network-attached storage (NAS) C. tape drives D. hard disk drives (HDDs)
hard disk drives (HDDs)
Some systems can function for an extended period of time with little downtime. Which of the following BEST describes this? A. redundant array of inexpensive disks (RAID) B. fault tolerance C. high availability (HA) D. storage area network (SAN)
high availability (HA)
_____ uses multiple types of security measures against different potential attacks. A. vendor diversity B. crypto diversity C. layered security D. control diversity
layered security
At work, you are in a remote location and you need to set up a secure, non-persistent operating system on a computer, so you can securely access a remote network. What kind of tool can you use to do this? A. hard disk drive (HDD) B. live boot media C. storage area network (SAN) D. storage area network (SAN)
live boot media
What kind of load balancer scheduling sends each new request to a server based on how active that server is? For this scheduling, the most active servers are sent the fewest requests and the least active servers are sent the most requests. A. affinity B. active-active C. round robin D. active-passive
active-active
What kind of load balancer scheduling has idle servers that are not being used? If an active server fails, then one of the idle servers takes its place. A. round robin B. active-active C. affinity D. active-passive
active-passive
What kind of load balancer scheduling is used to maintain the connection between a server and a computer by sending requests with the same IP address to the same server? A. active-passive B. active-active C. round robin D. affinity
affinity
_____ uses different types of cryptography to strengthen security. A. vendor diversity B. control diversity C. crypto diversity D. layered security
crypto diversity
_____ uses broad and variable sources of defense as part of a strategic plan. A. crypto diversity B. control diversity C. vendor diversity D. defense in depth
defense in depth