14. Organisational Documents and Policies Flashcards

1
Q
  1. The way to properly install or remove software on the servers is an example of which of the following?
    a. Plan
    b. Policy
    c. Procedure
    d. Code
A

c. For every policy on your network, there should be a credible related procedure that clearly dictates the steps to take in order to fulfil it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  1. Which of the following is a plan for reversing changes and recovering from any adverse effects from the changes?
    a. Backup
    b. Secondary
    c. Rollback
    d. Failover
A

c Those making the changes should be completely briefed in these rollback procedures, and they should exhibit a clear understanding of them prior to implementing the changes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
  1. Which of the following is the amount of time a system will be down or unavailable during the implementation of changes?
    a. Downtime
    b. Maintenance window
    c. MTBF
    d. Work factor
A

b. A maintenance window is the amount of time a system will be down or unavailable during the implementation of changes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
  1. Which of the following is not a device hardening technique?
    a. Remove unnecessary applications
    b. Deploy an access control vestibule
    c. Block unrequired ports
    d. Disable unnecessary services
A

b. An access control vestibule is an access control solution, not a device hardening technique.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
  1. Which policy automatically logs a user out after a specified period without activity?
    a. Password complexity
    b. Password history
    c. Password length
    d. Authentication period
A

d. Authentication period controls how long a user can remain logged in. If a user remains logged in for the specified period without activity, the user will automatically be logged out.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  1. BYOD policies apply to what type of device?
    a. Mobile
    b. Desktop
    c. Server
    d. Firewall
A

a. Bring your own device (BYOD) initiatives can be successful if implemented correctly. The key is to implement control over these personal mobile devices that leave the safety of your network and return later after potentially being exposed to environments that are out of your control.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
  1. Which tool can prevent the emailing of a document to anyone other than Sales group members?
    a. SSS
    b. STP
    c. DLP
    d. VBA
A

c. Data loss prevention (DLP) software attempts to prevent data leakage. It does this by maintaining awareness of actions than can and cannot be taken with respect to a document.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  1. Which of the following connects equipment (inside plant) to cables and subscriber carrier equipment (outside plant)?
    a. IDF
    b. MDF
    c. Plant rack
    d. Access control vestibule
A

b. The main distribution frame (MDF) connects equipment (inside plant) to cables and subscriber carrier equipment (outside plant). It also terminates cables that run to intermediate distribution frames (IDFs) distributed throughout the facility.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
  1. Which of the following is not part of the Information Gathering step of a site survey?
    a. Determine the scope of the network with respect to applications in use
    b. Verify optimal distances between prospective AP locations
    c. Identify areas that must be covered.
    d. Assess types of wireless devices that will need to be supported.
A

b. Verifying optimal distances between prospective AP locations is part of the Pre-deployment Site Survey step.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
  1. Device baselines include information about all but which of the following components?
    a. CPU
    b. Memory
    c. Hard disk
    d. Display
A

d. For networks and networked devices, baselines include information about four key components: processor, memory, hard-disk (or other storage) subsystem, and wired/wireless utilisation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly