3.3.4 Practice Questions Flashcards

1
Q

You have implemented a regular backup schedule for a Windows system, backing up data files every night and creating a system image backup once per week. For security reasons, your company has decided not to store a redundant copy of the backup media at an off-site location. Which of the following would be the best backup and storage option?

answer

Use differential backups and store them on a shelf next to the backup device.

Use incremental backups and store them in a drawer in your office.

Use incremental backups and store them in a locked fireproof safe.

Use differential backups and store them in a locked room.

A

Use incremental backups and store them in a locked fireproof safe.

Explanation
Incremental backups back up every file that’s changed since the last full or incremental backup. If you can’t store backups at an off-site location, you should make sure that the backups are locked up and that measures are taken to protect the backups from a disaster.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

You are in the process of implementing policies and procedures that require employee identification. You observe employees holding a secure door for others to pass through. Which of the following training sessions should you implement to help prevent this in the future?

answer

How to prevent piggybacking and tailgating.

Why employees should never share their ID badge with anyone.

Why employees should wear their badge at all times.

What to do if you encounter a person without a badge.

A

How to prevent piggybacking and tailgating.

Explanation
Piggybacking implies that the person who has opened the door with their credentials knows that others are following them in through the secure door.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Listen to exam instructions
You have a set of DVD-RW discs that were used to archive files from your latest project. You need to prevent the sensitive information on the discs from being compromised. Which of the following methods should you use to destroy the data?

answer

Write junk data on the discs.

Delete the data on the discs.

Shred the discs.

Degauss the discs.

A

Shred the discs.

Explanation
To completely prevent reading data from discs, destroy them using a DVD shredder or crushing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following best describes a physical barrier used to deter an aggressive intruder?

answer

Double-entry doors

Anti-passback system

Alarmed carrier PDS

Large flowerpots

A

Large flowerpots

Explanation
Bollards can be small straight concrete pillars, flat barricades, ball shaped pieces of concrete, large flowerpots, or even cement picnic tables. The idea is to prevent attackers from forcing themselves in by driving through an exterior wall or door.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Joe, a bookkeeper, works in a cubicle environment and is often called away from his desk. Joe doesn’t want to sign out of his computer each time he leaves. Which of the following is the best solutions for securing Joe’s workstation?

answer

Configure the screen saver to require a password.

Change the default account names and passwords.

Apply multifactor authentication on his computer.

Set a strong password, that require special characters.

A

Configure the screen saver to require a password.

Explanation
The best solution is to configure the screen saver or screen lock to be applied after a short period of nonuse and to require a password to return to the desktop

How well did you know this?
1
Not at all
2
3
4
5
Perfectly