Chapter 12 Network Policies and Procedures
In business continuity planning, what is the primary focus of the scope? Business processes Company assets Recovery time objective Human life and safety
Business processes
Which of the following terms describes a test lab environment that does not require the use of physical hardware? VLAN Network as a service (NaaS) Virtual sandbox Offsite virtual storage
Virtual sandbox
Purchasing insurance is what type of response to risk? Rejection Acceptance Deployment of a countermeasure Transference
Transference
Which business document is a contract that defines a set of terms that will govern future agreement between two parties?
master service agreement
Which component of a change and configuration management policy specifies options for reverting a system back to the state it was in before a change was made?
roolback
Match each interoperability agreement document on the left with the appropriate description on the right.each document any be used once, more than once, or not at all.
specifies exactly which services will be performed by each party=SLA bids a vendor in an agreement to provide services on an ongoing basis=BPO provides a summary of which party is responsible for preforming specific task = MOU documents how the networks will be connected = ISA defines how disputes will be managed = SLA specifies a prest discounted pricing structure = BPO
Which business document is a contract that defines the tasks, time frame and deliverable that a vendor must perform for a client?
statement of work
Arrange the steps in the change and configuration management process on the left into correct completion order on the right.
step 1 = identify the need for a change step 2= conduct feasibility analysis step 3= define the procedure for implementing the change step 4= notify affected parties of the pending change step 5= implementing the change step 6= test the implementation step 7 = document the change
You have installed anti-virus software o computers at you business. within a few days, however, you notice that once computer ha a virus . when you question the computer user, she says she did install some software a few days ago, but it was supposed to be a file compression utility; She admits she did not scan the file running it. What should you add o your security measures to help prevent this from happening again?
user awareness training
What is the most common security policy failure?
lack of user awareness
Which of the following is an example of an internal threat? A delivery man is able to walk into a controlled area and steal a laptop. A user accidentally deletes the new product designs. A water pipe in the server room breaks. A server backdoor allows an attacker on the internet to gain access to the intranet site.
A user accidentally deletes the new product designs.
You are concerned about the amount of traffic that passed through a router on your network. You want to see how the amount of traffic has changed over time. Which document would help you identify past average network traffic? Network diagram Event log Baseline History log
Baseline
You are in the habit of regularly monitoring performance statistics for your devices. You find that this month, a specific server has averaged a higher number of active connections than last month. Which type of document should you update to reflect this change? Network diagram Configuration documentation Baseline Change log Wiring schematic
Baseline
You are troubleshooting a workstation connection to the network. During your troubleshooting, you replace the drop cable connecting the computer to the network. Which type of document should you update? Network diagram Change documentation Wiring schematic Configuration documentation
Change documentation
You plan to implement a new security device on your network. Which of the following policies outlines the process you should follow before implementing that device? SLA Acceptable use Resource allocation Change management
Change management
Which of the following network strategies connects multiple servers together so that if one server fails, the others immediately take over its tasks, preventing a disruption in service? Mirroring Clustering Adapter bonding Storage area networks (SANs)
Clustering
You want to make sure that the correct ports on a firewall are open or closed. Which document should you check? Wiring schematic Policy Baseline Configuration documentation
Configuration documentation
Which of the following is not a valid response to a risk discovered during a risk analysis? Assignment Acceptance Denial Mitigation
Denial
You manage the website for your company. The Web1 server hosts the website. This server has the following configuration: • Dual core processor • Dual power supplies • RAID 5 volume • One RAID controller • Two 1000 Mbps network adapters Which component is a single point of failure for the website? Network adapter Power supply Disk controller Disk storage
Disk controller
What is the primary goal of business continuity planning? Maintaining business operations with reduced or restricted infrastructure capabilities or resources Minimizing the risk of delays and interruptions in services Protecting an organization from major computer services failure Minimizing decision-making during the development process
Maintaining business operations with reduced or restricted infrastructure capabilities or resources
When recovery is being performed due to a disaster, which services are to be stabilized first? Mission critical Outside communications Least business critical Financial support
Mission critical
If an organization shows sufficient due care, which burden is eliminated in the event of a security breach? Negligence Investigation Liability Asset loss
Negligence
When troubleshooting a router, you want to identify which other devices are connected to the router, as well as the subnet addresses of each connected subnet. Which type of document would most likely have this information? Wiring schematic Procedure Baseline Network diagram Policy
Network diagram
A new law was recently passed that states that all businesses must keep a history of the emails sent between members of the board of directors. You need to ensure that your organization complies with this law. Which document type would you update first in response to this new law? Procedure Configuration documentation Change documentation Policy
Policy
When analyzing assets, which analysis method assigns financial values to assets? Quantitative Acceptance Qualitative Transfer
Quantitative
You need to find out what kind of laws might apply to the design and operation of your network. Which type of document would you consult? Regulation Procedure Policy Baseline
Regulation
Your company has developed and implemented countermeasures for the greatest risks to their assets. However, there is still some risk left. What is the remaining risk called? Risk Loss Residual risk Exposure
Residual risk
What is the greatest threat to theft of data in most secure organizations? USB devices Hacker intrusion Malware Operator error
USB devices
You manage a network with a single switch. All hosts connect to the network through the switch. You want to increase the security of devices that are part of the accounting department. You want to make sure that broadcast traffic sent by accounting computers is only received by other accounting computers, and you want to implement ACLs to control traffic sent to accounting computers through the network. What should you do? Use a router to configure a subnet for the accounting computers. Configure a VLAN on the switch for the accounting computers. Implement NAC with 802.1x authentication for the accounting computers. Configure MAC address filtering on the switch for the accounting computers.
Use a router to configure a subnet for the accounting computers.
You manage a website for your company. The website uses three servers configured in a cluster. Incoming requests are distributed automatically between the three servers. All servers use a shared storage device that holds the website contents. Each server has a single network connection and a single power supply. Considering the availability of your website, which component represents a single point of failure? Power supply Website storage Network adapter Web server
Website storage
When is choosing to do nothing about an identified risk acceptable? When the cost of protecting the asset is greater than the potential loss. When the threat is most likely to come from an internal source instead of an external source. When the threat is likely to occur less than once a year. When the asset is an intangible asset instead of a tangible asset.
When the cost of protecting the asset is greater than the potential loss.
Which of the following documents would likely identify that drop cables on your network use the T568A standard? Baseline Wiring schematic Policy Network diagram Change log
Wiring schematic
Which type of documentation would you consult to find the location of RJ45 wall jacks and their endpoints in the intermediate distribution closet? Policy Procedure Baseline Wiring schematic
Wiring schematic
You are troubleshooting a workstation connection to the network. During your troubleshooting, you move the cable in the wiring closet to a different port on the patch panel. Which type of document should you update? Logical network diagram Wiring schematic Procedure Baseline
Wiring schematic
You are troubleshooting the connection of a computer in an office to the punch down block in the distribution closet. Which document would you consult to identify the termination of the cable on the punch down block based on the wall jack location in the office? Logical network diagram Regulation Procedure Wiring schematic
Wiring schematic
Which of the ff defines an acceptable use agreement?
an agreement that identifies the employee's rights to use company property, such as internet access and computer equipment, for personal use
Which of the ff are typically associated with human resources security policies? Select two
background check termination
Which components of a change configuration management policy identifies the need for a proposed change?
change request
A code of ethics accomplishes all bu which of the following?
clearly defines courses of action to take when a complex issue is encountered
Match each third-party integration phase on the left with the task that need to be completed during that phase on the right. each may be used ,more than once or not at all
communicate vulnerability assessment findings with other party = ongoing operation disable VPN configurations that allow partner access to your network=off-boarding compare your organizations security policies with the partner's policies= onboarding disable the domain trust relationship between networks=off boarding identify how privacy will be protected= onboarding draft an ISA= onboarding conduct regular security audits=ongoing operations
Your organization entered into an interoperability agreement(IA) with another organization a year ago.as a part of this agreement, a federated trust was established between your domain and the partner domain The partnership has been in the ongoing operations phase for almost nine months . as security administrator , which tasks should you complete during this phase? Select two
conduct periodic vulnerability assessment verify compliance with the IA documents
Which component of a change and configuration management policy identifies technical and budgetary considerations associated with a proposed change and also identifies any potential impacts to the network?
feasibility analysis
Your organization is in the process of negotiating an interoperability agreement (IA) with another organisation. as a part of this agreement, the partner organization proposes that a federated trust be established between your domain and their domain. this configuration will allow user in their domain to access resources in your domain and vice versa. As a security administrator , which task should u complete during this phase? Select two
identify how data ownership will be determined identify how data will be shared