Chapter 12 Study Guide

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Negligence

If an organization shows sufficient due care, which burden is eliminated in the event of a security breach?

Business processes

In business continuity planning, what is the primary focus of the scope?

Transference

Purchasing insurance is what type of response to risk?

Rollback

Which component of a change and configuration management policy specifies options for reverting a system back to the state it was in before a change was made?

Background checks Termination

Which of the following are typically associated with human resource security policies? (Select two.)

An agreement that identifies the employee's rights to use company property, such as internet access and computer equipment, for personal use.

Which of the following defines an acceptable use agreement?

Wiring schematic

Which of the following documents would likely identify that drop cables on your network use the T568A standard?

A user accidentally deletes the new product designs.

Which of the following is an example of an internal threat?

Denial

Which of the following is not a valid response to a risk discovered during a risk analysis?

Policy

A new law was recently passed that states that all businesses must keep a history of the emails sent between members of the board of directors. You need to ensure that your organization complies with this law. Which document type would you update first in response to this new law?

Clearly defines courses of action to take when a complex issue is encountered.

A code of ethics accomplishes all but which of the following?

Step 1 Identify the need for a change. Step 2 Conduct a feasibility analysis. Step 3 Define the procedure for implementing the change. Step 4 Notify affected parties of the pending change. Step 5 Implement the change. Step 6 Test the implementation. Step 7 Document the change.

Arrange the steps in the change and configuration management process on the left into correct completion order on the right.

Specifies exactly which services will be performed by each party. SLA Binds a vendor in an agreement to provide services on an ongoing basis. BPO Provides a summary of which party is responsible for performing specific tasks. MOU Documents how the networks will be connected. ISA Defines how disputes will be managed. SLA Specifies a preset discounted pricing structure. SLA BPO

Match each interoperability agreement document on the left with the appropriate description on the right. Each document may be used once, more than once, or not at all.

Communicate vulnerability assessment findings with the other party. Ongoing operations Disable VPN configurations that allow partner access to your network. Off-boarding Compare your organization's security policies with the partner's policies. Onboarding Disable the domain trust relationship between networks. Off-boarding Identify how privacy will be protected. Onboarding Draft an ISA. Onboarding Conduct regular security audits. Ongoing operations

Match each third-party integration phase on the left with the tasks that need to be completed during that phase on the right. Each phase may be used once, more than once, or not at all.

USB devices

What is the greatest threat to theft of data in most secure organizations?

Lack of user awareness

What is the most common security policy failure?

Maintaining business operations with reduced or restricted infrastructure capabilities or resources

What is the primary goal of business continuity planning?

Quantitative

When analyzing assets, which analysis method assigns financial values to assets?

When the cost of protecting the asset is greater than the potential loss.

When is choosing to do nothing about an identified risk acceptable?

Mission critical

When recovery is being performed due to a disaster, which services are to be stabilized first?

Network diagram

When troubleshooting a router, you want to identify which other devices are connected to the router, as well as the subnet addresses of each connected subnet. Which type of document would most likely have this information?

Master service agreement

Which business document is a contract that defines a set of terms that will govern future agreements between two parties?

Statement of work

Which business document is a contract that defines the tasks, time frame, and deliverables that a vendor must perform for a client?

Feasibility analysis

Which component of a change and configuration management policy identifies technical and budgetary considerations associated with a proposed change and also identifies any potential impacts to the network?

Change request

Which component of a change and configuration management policy identifies the need for a proposed change?

Clustering

Which of the following network strategies connects multiple servers together so that if one server fails, the others immediately take over its tasks, preventing a disruption in service?

Virtual sandbox

Which of the following terms describes a test lab environment that does not require the use of physical hardware?

Wiring schematic

Which type of documentation would you consult to find the location of RJ45 wall jacks and their endpoints in the intermediate distribution closet?

Baseline

You are concerned about the amount of traffic that passed through a router on your network. You want to see how the amount of traffic has changed over time. Which document would help you identify past average network traffic?

Baseline

You are in the habit of regularly monitoring performance statistics for your devices. You find that this month, a specific server has averaged a higher number of active connections than last month. Which type of document should you update to reflect this change?

Wiring schematic

You are troubleshooting a workstation connection to the network. During your troubleshooting, you move the cable in the wiring closet to a different port on the patch panel. Which type of document should you update?

Change documentation

You are troubleshooting a workstation connection to the network. During your troubleshooting, you replace the drop cable connecting the computer to the network. Which type of document should you update?

Wiring schematic

You are troubleshooting the connection of a computer in an office to the punch down block in the distribution closet. Which document would you consult to identify the termination of the cable on the punch down block based on the wall jack location in the office?

User awareness training

You have installed anti-virus software on computers at your business. Within a few days, however, you notice that one computer has a virus. When you question the computer's user, she says she did install some software a few days ago, but it was supposed to be a file compression utility. She admits she did not scan the file before running it. What should you add to your security measures to help prevent this from happening again?

Use a router to configure a subnet for the accounting computers.

You manage a network with a single switch. All hosts connect to the network through the switch. You want to increase the security of devices that are part of the accounting department. You want to make sure that broadcast traffic sent by accounting computers is only received by other accounting computers, and you want to implement ACLs to control traffic sent to and between accounting computers through the network. Which of the following is the BEST solution?

Website storage

You manage a website for your company. The website uses three servers configured in a cluster. Incoming requests are distributed automatically between the three servers. All servers use a shared storage device that holds the website contents. Each server has a single network connection and a single power supply. Considering the availability of your website, which component represents a single point of failure?

Disk controller

You manage the website for your company. The Web1 server hosts the website. This server has the following configuration: Dual core processor Dual power supplies RAID 5 volume One RAID controller Two 1000 Mbps network adapters Which component is a single point of failure for the website?

Regulation

You need to find out what kind of laws might apply to the design and operation of your network. Which type of document would you consult?

Change management

You plan to implement a new security device on your network. Which of the following policies outlines the process you should follow before implementing that device?

Configuration documentation

You want to make sure that the correct ports on a firewall are open or closed. Which document should you check?

Residual risk

Your company has developed and implemented countermeasures for the greatest risks to their assets. However, there is still some risk left. What is the remaining risk called?

Verify compliance with the IA documents. Conduct periodic vulnerability assessments.

Your organization entered into an interoperability agreement (IA) with another organization a year ago. As a part of this agreement, a federated trust was established between your domain and the partner domain. The partnership has been in the ongoing operations phase for almost nine months now. As a security administrator, which tasks should you complete during this phase? (Select two.)

Identify how data will be shared. Identify how data ownership will be determined.

Your organization is in the process of negotiating an interoperability agreement (IA) with another organization. As a part of this agreement, the partner organization proposes that a federated trust be established between your domain and their domain. This configuration will allow users in their domain to access resources in your domain and vice versa. As a security administrator, which tasks should you complete during this phase? (Select two.)


संबंधित स्टडी सेट्स

AP Chemistry | Unit 2 Day Quizzes

View Set

MO Life Insurance Practice Questions

View Set

Nutrition for Healthy Living Chapter 1

View Set