Network Compass 16
In active-passive configuration, network traffic is distributed across: -All network infrastructure devices -Network infrastructure devices marked as active -Least utilized network infrastructure devices -Network infrastructure devices marked as passive
-Network infrastructure devices marked as active
In active-active configuration, network traffic is distributed across: -Least utilized network infrastructure devices -None of the network infrastructure devices -All designated network infrastructure devices -Most utilized network infrastructure devices
All designated network infrastructure devices
Which of the following power redundancy solutions would be best suited for providing long-term emergency power during an unexpected main power source outage? Dual-power supply Standby UPS Backup generator Managed PDU
Backup generator
Which of the following answers refers to a vulnerability database? DBA CVE DBaaS AIS
CVE
Which alternate site is the least expensive to implement? Cold site Warm site Hot site Cloud site
Cloud site
Which of the following backup facilities does not require physical infrastructure? Cold site Warm site Hot site Cloud site
Cloud site
A disaster recovery facility that provides only the physical space for recovery operations is called: Hot site Cloud site Warm site Cold site
Cold site
Which of the security measures listed below would be effective against the malicious insider threat? (Select 3 answers) DLP system Principle of least privilege Time-of-day restrictions Strong authentication Usage auditing and review
DLP system Principle of least privilege Usage auditing and review
Which of the following terms refer to the concept of confidentiality? (Select 3 answers) Fault tolerance Encryption Non-repudiation Access control methods Steganography Redundancy Patch management Hashing Load balancing
Encryption Access control methods Steganography
High MTBF value indicates that a component or system provides low reliability and is more likely to fail. True False
False
Which of the following terms refer(s) to the concept of integrity? (Select all that apply) Steganography Hashing Digital signatures Encryption Digital certificates Redundancy Non-repudiation Access control methods Fault tolerance
Hashing Digital signatures Digital certificates Non-repudiation
Which alternate site allows for fastest disaster recovery? Cold site Hot site Warm site
Hot site
Which of the following violates the principle of least privilege? Onboarding process Improperly configured accounts Shared accounts for privileged users Time-of-day restrictions
Improperly configured accounts
Which term best describes a disgruntled employee abusing legitimate access to company's internal resources? Script kiddie Insider threat Hacktivist Blue hat hacker
Insider threat
Which of the following terms is used to describe an average time required to repair a failed component or device? MTBF RPO MTTR SLA
MTTR
Which of the following answers refers to a device designed to supply (and monitor the quality of) electric power to multiple outlets? PSU MDF PDU IDF
PDU
In Business Continuity Planning (BCP), the maximum tolerable point in time to which systems and data must be recovered after an outage is called: RPO MTBF RTO MTTR
RPO
Which of the acronyms listed below refers to a maximum tolerable period of time required for restoring business functions after a failure or disaster? SLA RTO AUP RPO
RTO
Which of the following terms refer(s) to the concept of availability? (Select all that apply) Redundancy Fault tolerance Non-repudiation Hashing Load balancing Patch management Digital certificates Encryption Access control methods
Redundancy Fault tolerance Load balancing Patch management
The term "CIA triad" is used to describe the basic principles of information security. True False
True
Which of the following statements does not match a typical description of nation states or state-funded groups identified as threat actors? Political or economic motivation High level of technical sophistication Advanced Persistent Threat (APT) High level of resources/funding Typically classified as an internal threat
Typically classified as an internal threat
Which of the following networking protocols provide(s) redundancy? (Select all that apply) DSCP VRRP IS-IS FHRP EIGRP
VRRP FHRP
Which of the protocols listed below enable(s) designating a backup router in the event of an active router failure? (Select all that apply) DSCP VRRP IS-IS HSRP EIGRP
VRRP HSRP
An alternate site that typically provides only the hardware infrastructure is referred to as a: Cold site Hot site Cloud site Warm site
Warm site
A type of attack aimed at exploiting vulnerability that is present in already released software but unknown to the software developer is called: Xmas attack Zero-day attack IV attack Replay attack
Zero-day attack