Security+ 2.5 Cybersecurity Resilience

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

A database backup schedule consists of weekly full backups performed on Saturday at 12:00 a.m. and daily incremental backups also performed at 12:00 a.m. If the database is restored on Wednesday afternoon, which of the following is the number of individual backups that would need to be applied to complete the database recovery? A. 2 B. 3 C. 1 D. 4

4

These are devices that distribute electrical power among devices. A. uninterruptible power supply (UPS) B. managed power distribution units (PDUs) C. dual supply D. generator

managed power distribution units (PDUs)

This is when we combine several physical NICs into one logical NIC. A. network interface card (NIC) teaming B. round robin C. uninterruptible power supply (UPS) D. managed power distribution units (PDUs)

network interface card (NIC) teaming

This is a dedicated data storage server that is accessible over a network. It has file-level access to data storage. A. network-attached storage (NAS) B. hard disk drives (HDDs) C. storage area network (SAN) D. tape drives

network-attached storage (NAS)

This is when we restore a device to a previous secure condition. We take the computer and data back to a previous point in time. A. revert to known state B. rollback to last known good configuration C. live boot media D. persistence

rollback to last known good configuration

What kind of load balancer scheduling sends each new request to a different server in order? Once all servers are sent a new request, the next request is sent to the first server again. A. active-passive B. round robin C. active-active D. affinity

round robin

This is a network that provides access to storage devices. It has block-level access to data storage. A. network-attached storage (NAS) B. tape drives C. storage area network (SAN) D. hard disk drives (HDDs)

storage area network (SAN)

The most common backup media has been _____, as it is cheaper and stores more data than other media. A. storage area network (SAN) B. hard disk drives (HDDs) C. tape drives D. network-attached storage (NAS)

tape drives

This is a temporary power source for computer devices when the power goes out. A. managed power distribution units (PDUs) B. network interface card (NIC) teaming C. uninterruptible power supply (UPS) D. generator

uninterruptible power supply (UPS)

A database backup schedule consists of weekly full backups performed on Saturday at 12:00 a.m. and daily differential backups also performed at 12:00 a.m. If the database is restored on Wednesday afternoon, which of the following is the number of individual backups that would need to be applied to complete the database recovery? A. 3 B. 1 C. 4 D. 2

2

A database backup schedule consists of weekly full backups performed on Saturday at 12:00 a.m. and daily incremental backups also performed at 12:00 a.m. If the database is restored on Tuesday afternoon, which of the following is the number of individual backups that would need to be applied to complete the database recovery? A. 2 B. 3 C. 1 D. 4

3

This is when systems are up and running when needed. A. Scalability B. Fault tolerance C. Availability D. Multipathing

Availability

_____ uses different security control types to strengthen security. A. control diversity B. vendor diversity C. layered security D. crypto diversity

Control diversity

_____ is the fact that data is subject to the laws of the country where it is stored. A. Network interface card (NIC) teaming B. Uninterruptible power supply (UPS) C. Off-site backups D. Data sovereignty

Data sovereignty

A/an _____ backs up all files that were changed since the last full backup. The archive bit is NOT cleared afterwards. A. Full backup B. Snapshot backup C. Incremental backup D. Differential backup

Differential backup

This is when we have a second power supply that can also power the device if the primary power supply fails. A. uninterruptible power supply (UPS) B. managed power distribution units (PDUs) C. generator D. dual supply

dual supply

This is a device that creates electricity for long-term power outages. A. uninterruptible power supply (UPS) B. managed power distribution units (PDUs) C. network interface card (NIC) teaming D. generator

generator

A/an _____ backs up all files. The archive bit gets cleared afterward. A. Full backup B. Differential backup C. Incremental backup D. Snapshot backup

Full backup

Which type of backup has the slowest backup time? A. Differential backup B. Incremental backup C. Full backup D. Disk backup

Full backup

Which type of backup has the fastest backup time? A. Archive bit B. Full backup C. Differential backup D. Incremental backup

Incremental backup

What device can evenly spread the data load across multiple computers or networks? A. Load balancer B. XOR C. Multipathing D. RAID

Load balancer

This is when we create more than one path in a network, in case one part of the network were to fail. A. Multipathing B. XOR C. RAID D. Load balancer

Multipathing

What is a way to protect your data against disasters such as fires or floods? A. Off-site backups B. Load balancers C. Data sovereignty D. Redundant array of inexpensive disks (RAID)

Off-site backups

_____ is the sequence in which different systems are reinstated after a disaster has occurred. A. High availability (HA) B. Order of restoration C. Off-site backups D. Data sovereignty

Order of restoration

_____ uses multiple disk drives for data storage to improve redundancy and performance. Which of the following BEST describes this? A. High availability (HA) B. RAID C. Fault tolerance D. Snapshot backup

RAID

For this type of RAID, two copies of data are written to two drives. A. RAID 6: striping with two parity blocks B. RAID 0: striping C. RAID 1: mirroring D. RAID 5: striping with distributed parity

RAID 1: mirroring

For this type of RAID, the exclusive or (XOR) operation is used to reconstruct data after one disk failure. A. RAID 1+0: striping with a mirror B. RAID 5: striping with distributed parity C. RAID 1: mirroring D. RAID 0: striping

RAID 5: striping with distributed parity

This is the use of duplicated equipment to improve the availability of a system. A. Accounting B. Redundancy C. Confidentiality D. Integrity

Redundancy

This is when a device or system can handle increases in traffic without decrease in performance . A. Multipathing B. Fault tolerance C. Scalability D. Availability

Scalability

A/an _____ captures all the data on a VM (virtual machine) at a specific date and time. A. Differential backup B. Incremental backup C. Full backup D. Snapshot backup

Snapshot backup

This backup media has a large storage capability and can use data compression to save space. Prices have been coming down in recent years. A. storage area network (SAN) B. network-attached storage (NAS) C. tape drives D. hard disk drives (HDDs)

hard disk drives (HDDs)

Some systems can function for an extended period of time with little downtime. Which of the following BEST describes this? A. redundant array of inexpensive disks (RAID) B. fault tolerance C. high availability (HA) D. storage area network (SAN)

high availability (HA)

_____ uses multiple types of security measures against different potential attacks. A. vendor diversity B. crypto diversity C. layered security D. control diversity

layered security

At work, you are in a remote location and you need to set up a secure, non-persistent operating system on a computer, so you can securely access a remote network. What kind of tool can you use to do this? A. hard disk drive (HDD) B. live boot media C. storage area network (SAN) D. storage area network (SAN)

live boot media

What kind of load balancer scheduling sends each new request to a server based on how active that server is? For this scheduling, the most active servers are sent the fewest requests and the least active servers are sent the most requests. A. affinity B. active-active C. round robin D. active-passive

active-active

What kind of load balancer scheduling has idle servers that are not being used? If an active server fails, then one of the idle servers takes its place. A. round robin B. active-active C. affinity D. active-passive

active-passive

What kind of load balancer scheduling is used to maintain the connection between a server and a computer by sending requests with the same IP address to the same server? A. active-passive B. active-active C. round robin D. affinity

affinity

_____ uses different types of cryptography to strengthen security. A. vendor diversity B. control diversity C. crypto diversity D. layered security

crypto diversity

_____ uses broad and variable sources of defense as part of a strategic plan. A. crypto diversity B. control diversity C. vendor diversity D. defense in depth

defense in depth


संबंधित स्टडी सेट्स

Chapter 12 Cognitive Development in Childhood

View Set

Fundamentals of management cha 7 assignment

View Set

Psy 2403 - Horney, Chapter 6: Horney, Introduction to Personality: Ch 5- Karen Horney

View Set

Differences Between Articles of Confederation and Constitution

View Set

Personal Finance Ch 1-4 Quiz Review For Exam 1 UCO

View Set