Networking Chapter 12

Ace your homework & exams now with Quizwiz!

Match each third party integration phase on the left with the tasks that need to be completed during the phase on the right. Each phase may be used once, more than once, or not at all. Drag: A. Onboarding B. Ongoing operations C. Off-boarding Drop: - Communicate vulnerability assessment findings with the other party - Disable VPN configurations that allow partner access to your network - Compare your organization's security policies with the partner's policies - Disable the domain trust relationship between networks - Identify how privacy will be protected - Draft an ISA - Conduct regular security audits

- Communicate vulnerability assessment findings with the other party B. Ongoing operations - Disable VPN configurations that allow partner access to your network C. Off-boarding - Compare your organization's security policies with the partner's policies A. Onboarding - Disable the domain trust relationship between networks C. Off-boarding - Identify how privacy will be protected A. Onboarding - Draft an ISA A. Onboarding - Conduct regular security audits B. Ongoing operations

Match each interoperability agreement document on the left with the appropriate description on the right. Each document may be used once, more than once, or not at all. Drag: A. BPO B. SLA C. MOU D. ISA Drop: - Specifies exactly which services will be performed by each party - Binds a vendor in an agreement to provide services on an ongoing basis - Provides a summary of which party is responsible for performing specific tasks - Documents how the networks will be connected - Defines how disputes will be managed - Specifies a preset discounted pricing structure

- Specifies exactly which services will be performed by each party B. SLA - Binds a vendor in an agreement to provide services on an ongoing basis A. BPO - Provides a summary of which party is responsible for performing specific tasks C. MOU - Documents how the networks will be connected D. ISA - Defines how disputes will be managed B. SLA - Specifies a preset discounted pricing structure A. BPO

Arrange the steps in the change and configuration management process on the left into correct completion order on the right. Drag: A. Conduct a feasability analysis B. Define the procedure for implementing the change C. Test the implementation D. Document the change E. Implement the change F. Identify the need for a change G. Notify affected parties of the pending change Notify: - Step 1 - Step 2 - Step 3 - Step 4 - Step 5 - Step 6 - Step 7

- Step 1 F. Identify the need for a change - Step 2 A. Conduct a feasability analysis - Step 3 B. Define the procedure for implementing the change - Step 4 G. Notify affected parties of the pending change - Step 5 E. Implement the change - Step 6 C. Test the implementation - Step 7 D. Document the change

You are concerned about the amount of traffic that passed through a router on your network. You want to see how the amount of traffic has changed over time. Which document would help you identify past average network traffic? A. Baseline B. Network diagram C. History log D. Event log

A. Baseline

In business continuity planning, what is the primary focus of the scope? A. Business processes B. Human life and safety C. Recovery time objetive D. Company assets

A. Business processes

Which component of a change and configuration management policy identifies the need for a proposed change? A. Change request B. Authorized downtime C. Feasibility analysis D. Rollback

A. Change request

You want to make sure that the correct ports on a firewall are opened or closed. Which document should you check? A. Configuration documentation B. Baseline C. Policy D. Wiring schematic

A. Configuration documentation

Which component of a change and configuration management policy identifies technical and budgetary considerations associated with a proposed change and also identifies any potential impacts to the network? A. Feasibility analysis B. Authorized downtime C. Rollback D. Change request

A. Feasibility analysis

What is the primary goal of business continuity planning? A. Minimizing business operations with reduced or restricted infrastructure capabilities or resources B. Minimizing decision making during the development process C. Minimizing the risk of delays and interruptions in services D. Protecting an organization from major computer services failure

A. Minimizing business operations with reduced or restricted infrastructure capabilities or resources

When troubleshooting a router, you want to identify which other devices are connected to the router, as well as the subnet adresses of each connected subnet. Which type of document would most likely have this information? A. Network diagram B. Baseline C. Wiring schematic D. Policy E. Procedure

A. Network diagram

Which business document is a contract that defines the tasks, time frame, and deliverables that a vendore must perform for a client? A. Statement of work B. Memorandum of understanding C. Interconnection security agreement D. Master service agreement

A. Statement of work

You have installed anti-virus software on computers at your business. Within a few days, however, you notice that one computer has a virus. When you question the computer's user, she says she did install some software a few days ago, but it was supposed to be a file compression utility. She admits she did not scan the file before running it. What should you add to your security measures to help prevent this from happening again? A. User awareness training B. Account lockout C. Close unused firewall ports D. Proxy server

A. User awareness training

Your organization entered into an interoperability agreement with another organization a year ago. As part of this agreement, a federated trust was established between your domain and the partner domain. The partnership has been in the ongoing operations phase for almost nine months now. As a security administrator, which tasks should you complete during this phase? (Select two.) A. Verify compliance with teh IA documents B. Negotiate the BPO agreement C. Disable user and group accounts that the partner organization used to access your organizations's data D. Conduct periodic vulnerability assessments E. Draft an MOU document

A. Verify compliance with teh IA documents D. Conduct periodic vulnerability assessments

You are troubleshooting a workstation connection to the network. During your troubleshooting, you replace the drop cable connecting the computer to the network. Which type of document should you update? A. Network diagram B. Change documentation C. Configuration documentation D. Wiring schematic

B. Change documentation

You plan to implement a new security device on your network. Which of the following policies outlines the process you should follow before implementing that device? A. Resource allocation B. Change management C. Acceptable use D. SLA

B. Change management

What is the most common security policy failure? A. Failure to assign responsibilities B. Lack of user awareness C. Overlooked critical assets D. Improperly outlined procedures

B. Lack of user awareness

A new line was recently passed that states that all businesses must keep a history of the emails sent between members of the board of directors. You need to ensure that your organization complies with this law. Which document type would you update first in response to this new law? A. Procedure B. Policy C. Change documentation D. Configuration documentation

B. Policy

Your company has developed and implemented countermeasures for the greatese risks to their assets. However, there is still some risk left. What is the remaining risk called? A. Loss B. Residual risk C. Exposure D. Risk

B. Residual risk

You are troubleshooting a workstation connection to the network. During your troubleshooting, you move the cable in the wiring closet to a different port on the patch panel. Which type of document should you update? A. Logical network diagram B. Wiring schematic C. Procedure D. Baseline

B. Wiring schematic

You are troubleshooting the connection of a computer in an office to the punch down block in the distribution closet. Which document would you consult to identify the termination of the cable on the punch down block based on the wall jack location in the office? A. Logical network diagram B. Wiring schematic C. Regulation D. Procedure

B. Wiring schematic

Which of the following is an example of an internal threat? A. A delivery man is able to walk into a controlled area and steal a laptop B. A water pipe in the server room breaks C. A user accidentally deletes the new product designs D. A server backdoor allows an attacker on the internet to gain access to the intranet site

C. A user accidentally deletes the new product designs

Which of the following defines an acceptable use agreement? A. An agreement that is a legal contract between the organization and the employee that specifies that the employee is not to disclose the organization's confidential information B. An agreement that outlines the organization's monitoring activities C. An agreement that identifies the employee's rights to use company property, such as internet access and computer equipment, for personal use D. An agreement that prohibits an employee from working for a competing organization for a specified time after the employee leaves the organization

C. An agreement that identifies the employee's rights to use company property, such as internet access and computer equipment, for personal use

A code of ethics accomplishes all but which of the following? A. Establishes a baseline for managing complex situations B. Serves as a reference for the creation of acceptable use policies C. Clearly defines courses of action to take when a complex issue is encountered D. Improves the professionalism of your organization as well as your profession

C. Clearly defines courses of action to take when a complex issue is encountered

Which of the following network strategies connects multiple servers togeter so that if one serve fails, the other immediately take over its tasks, preventing a disruption in service? A. Adapter bonding B. Storage area networks (SANs) C. Clustering D. Mirroring

C. Clustering

You manage the website for your company. The Web1 server hosts the website. This server has the following configuration: • Dual core processor • Dual power supplies • RAID 5 volume • One RAID controller • Two 1000 Mbps network adapters Which component is a single point of failure for the website? A. Disk storage B. Network adapter C. Disk controller D. Power supply

C. Disk controller

Which business document is a contract that defines a set of terms that will govern future agreements between two parties? A. Inerconnection security agreement B. Statement of work C. Master service agreement D. Memorandum of understanding

C. Master service agreement

Which analyzing assets, whih analysis method assigns financial vaues to assets? A. Qualitative B. Transfer C. Quantitative D. Acceptance

C. Quantitative

Which component of a change and configuration management policy specifies options for reverting options for reverting a system back to the state it was in before a change was made? A. Authorized downtime B. Feasibility analysis C. Rollback D. Change request

C. Rollback

Purchasing insurance is what type of response to risk? A. Deployment of a countermeasure B. Acceptance C. Transference D. Rejection

C. Transference

You manage a website for your company. The website uses three servers configured in a cluster. Incoming requests are distributed automatically between the three servers. All servers use a shared storage device that holds the website contents. Each server has a single network connection and a single power supply. Considering the availability of your website, which component represents a single point of failure? A. Network adapter B. Power supply C. Website storage D. Web server

C. Website storage

When is choosing to do nothing about an identified risk acceptable? A. When the asset is an intangible asset instead of a tangible asset B. When the threat is most likely to come from an internal source instead of an external source C. When the cost of protecting the asset is greater than the potential loss D. When the threat is likely to occur less than once a year

C. When the cost of protecting the asset is greater than the potential loss

Which type of documentation would you consult to find the location of RJ45 wall jacks and their endpoints in the intermediate distribution closet? A. Baseline B. Policy C. Wiring schematic D. Procedure

C. Wiring schematic

Which of teh following are typically associated with human resource security policies? (Select two.) A. SLA B. Change management C. Password policies D. Background checks E. Termination

D. Background checks E. Termination

You are in teh habit of regularly monitoring performance statistics for your devices. You find that this month, a specific server has averaged a higher number of active connections than last month. Which type of document should you update to reflect this change? A. Network diagram B. Change log C. Configuration documentation D. Baseline E. Wiring schematic

D. Baseline

Which of the following is not a valid response to a risk discovered during a risk analysis? A. Assignment B. Mitigation C. Acceptance D. Denial

D. Denial

Your organization is in the process of negotiating an interoperability agreement with another organization. As a part of this agreement, the partner organization proposes that a federated trust be established between your domain and their domain. This configuration will allow users in their domain to access resources in your domain and vice versa. As a security administrator, which tasks should you complete during this phase? (Select two.) A. Verify compliance with the IA documents B. Conduct security audits on the partner organization C. Reset all passwords the third part uses to access data or applications on your network D. Identify how data will be shared E. Identify how data ownership will be determined

D. Identify how data will be shared E. Identify how data ownership will be determined

When recovery is being performed due to a disaster, which services are to be stabilized first? A. Financial support B. Least business critical C. Outside communications D. Mission critical

D. Mission critical

If an organization shows sufficient due care, which burdenis eliminated in the event of a security breach? A. Asset loss B. Investigation C. Liability D. Negligence

D. Negligence

You need to find out what kind of laws might apply to the design and operation of your network. Which type of document would you consult? A. Baseline B. Procedure C. Policy D. Regulation

D. Regulation

What is the greatest threat to theft of data in most secure organizations? A. Operate error B. Malware C. Hacker intrusion D. USB devices

D. USB devices

You manage a network with a single switch. All hosts connect to the network through the switch. You want to increase the security of devices that are part of the accounting department. You want to make sure that broadcast traffic sent by accounting computers is only received by other accounting computers, and you want to implement ACLs to control traffic sent to accounting computers through the network. What should you do? A. Implement NAC with 802.1x authentication for the accounting computers B. Configure a VLAN on the switch for the accounting computers C. Configure MAC address filtering on the switch for the accounting computers D. Use a router to configure a subnet for the accounting computers

D. Use a router to configure a subnet for the accounting computers

Which of the following terms describes a test lab environment that does not require the use of physical hardware? A. Network as a service (NaaS) B. VLAN C. Offsite virtual storage D. Virtual sandbox

D. Virtual sandbox

Which of the following documents would likely identify that drop cables on your network use the T568A standard? A. Change log B. Policy C. Baseline D. Wiring schematic E. Network diagram

D. Wiring schematic


Related study sets

Total Compensation Chapter 7 Quiz

View Set

ORU HUM 202 Classical Roman Civilization

View Set

Biology Unit 1 lesson 4 all of the questions

View Set

Cellular Respiration and Fermentation Test

View Set

Neuron and Synaptic Transmission

View Set

Intro to Animal Science chapters 5-7 study questions

View Set

NSG 209 Test #3 HIV and Hypersensitivity practice questions

View Set