Network Policies and Procedures
In business continuity planning, what is the primary focus of the scope?
Business processes
An agreement that identifies the employee's rights to use company property, such as internet access and computer equipment, for personal use.
Conduct periodic vulnerability assessments. Verify compliance with the IA documents.
Which business document is a contract that defines a set of terms that will govern future agreements between two parties?
MSA
What is the primary goal of business continuity planning?
Maintaining business operations with reduced or restricted infrastructure capabilities or resources
Match each interoperability agreement document on the left with the appropriate description on the right. Each document may be used once, more than once, or not at all.
Specifies exactly which services will be performed by each party: SLA Binds a vendor in an agreement to provide services on an ongoing basis: BPO Provides a summary of which party is responsible for performing specific tasks: MOU Documents how the networks will be connected: ISA Defines how disputes will be managed: SLA Specifies a preset discounted pricing structure: BPO
Purchasing insurance is what type of response to risk?
Transference
Which of the following terms describes a test lab environment that does not require the use of physical hardware?
Virtual sandbox
Which of the following is an example of an internal threat?
A user accidentally deletes the new product designs.
Which of the following defines an acceptable use agreement?
An agreement that identifies the employee's rights to use company property, such as internet access and computer equipment, for personal use.
Which of the following are typically associated with human resource security policies? (Select two.)
Background checks Termination
You are concerned about the amount of traffic that passed through a router on your network. You want to see how the amount of traffic has changed over time. Which document would help you identify past average network traffic?
Baseline
You are in the habit of regularly monitoring performance statistics for your devices. You find that this month, a specific server has averaged a higher number of active connections than last month. Which type of document should you update to reflect this change?
Baseline
You are troubleshooting a workstation connection to the network. During your troubleshooting, you replace the drop cable connecting the computer to the network. Which type of document should you update?
Change document
You plan to implement a new security device on your network. Which of the following policies outlines the process you should follow before implementing that device?
Change management
Which component of a change and configuration management policy identifies the need for a proposed change?
Change request
A code of ethics accomplishes all but which of the following?
Clearly defines courses of action to take when a complex issue is encountered
Which of the following network strategies connects multiple servers together so that if one server fails, the others immediately take over its tasks, preventing a disruption in service?
Clustering
Match each third-party integration phase on the left with the tasks that need to be completed during that phase on the right. Each phase may be used once, more than once, or not at all.
Communicate vulnerability assessment findings with the other party: Ongoing operations Disable VPN configurations that allow partner access to your network: Off-boarding Compare your organization's security policies with the partner's policies: Onboarding Disable the domain trust relationship between networks: Off-boarding Identify how privacy will be protected: Onboarding Draft an ISA: Onboarding Conduct regular security audits: Ongoing operations
You want to make sure that the correct ports on a firewall are open or closed. Which document should you check?
Configuration doc
Which of the following is not a valid response to a risk discovered during a risk analysis?
Denial
You manage the website for your company. The Web1 server hosts the website. This server has the following configuration: Dual core processor Dual power supplies RAID 5 volume One RAID controller Two 1000 Mbps network adapters Which component is a single point of failure for the website?
Disk controller
Which component of a change and configuration management policy identifies technical and budgetary considerations associated with a proposed change and also identifies any potential impacts to the network?
Feasibility analysis
Your organization is in the process of negotiating an interoperability agreement (IA) with another organization. As a part of this agreement, the partner organization proposes that a federated trust be established between your domain and their domain. This configuration will allow users in their domain to access resources in your domain and vice versa. As a security administrator, which tasks should you complete during this phase? (Select two.)
Identify how data ownership will be determined Identify how data will be shared
What is the most common security policy failure?
Lack of user awareness
When recovery is being performed due to a disaster, which services are to be stabilized first?
Mission critical
If an organization shows sufficient due care, which burden is eliminated in the event of a security breach?
Negligence
When troubleshooting a router, you want to identify which other devices are connected to the router, as well as the subnet addresses of each connected subnet. Which type of document would most likely have this information?
Network diagram
A new law was recently passed that states that all businesses must keep a history of the emails sent between members of the board of directors. You need to ensure that your organization complies with this law. Which document type would you update first in response to this new law?
Policy
When analyzing assets, which analysis method assigns financial values to assets?
Quantitative
You need to find out what kind of laws might apply to the design and operation of your network. Which type of document would you consult?
Regulation
Your company has developed and implemented countermeasures for the greatest risks to their assets. However, there is still some risk left. What is the remaining risk called?
Residual risk
Which component of a change and configuration management policy specifies options for reverting a system back to the state it was in before a change was made?
Rollback
Which business document is a contract that defines the tasks, time frame, and deliverables that a vendor must perform for a client?
Statement of work
Arrange the steps in the change and configuration management process on the left into correct completion order on the right.
Step 1: Identify the need for a change. Step 2: Conduct a feasibility analysis. Step 3: Define the procedure for implementing the change. Step 4: Notify affected parties of the pending change. Step 5: Implement the change. Step 6: Test the implementation. Step 7: Document the change.
What is the greatest threat to theft of data in most secure organizations?
USB devices
You manage a network with a single switch. All hosts connect to the network through the switch. You want to increase the security of devices that are part of the accounting department. You want to make sure that broadcast traffic sent by accounting computers is only received by other accounting computers, and you want to implement ACLs to control traffic sent to and between accounting computers through the network. Which of the following is the BEST solution?
Use a router to configure a subnet for the accounting computers
You have installed anti-virus software on computers at your business. Within a few days, however, you notice that one computer has a virus. When you question the computer's user, she says she did install some software a few days ago, but it was supposed to be a file compression utility. She admits she did not scan the file before running it. What should you add to your security measures to help prevent this from happening again?
User awareness training
You manage a website for your company. The website uses three servers configured in a cluster. Incoming requests are distributed automatically between the three servers. All servers use a shared storage device that holds the website contents. Each server has a single network connection and a single power supply. Considering the availability of your website, which component represents a single point of failure?
Website storage
When is choosing to do nothing about an identified risk acceptable?
When the cost of protecting the asset is greater than the potential loss.
Which of the following documents would likely identify that drop cables on your network use the T568A standard?
Wiring schematic
Which type of documentation would you consult to find the location of RJ45 wall jacks and their endpoints in the intermediate distribution closet?
Wiring schematic
You are troubleshooting a workstation connection to the network. During your troubleshooting, you move the cable in the wiring closet to a different port on the patch panel. Which type of document should you update?
Wiring schematic
You are troubleshooting the connection of a computer in an office to the punch down block in the distribution closet. Which document would you consult to identify the termination of the cable on the punch down block based on the wall jack location in the office?
Wiring schematic