6 Flashcards
Naomi wants to deploy a tool that can allow her to scale horizontally while also allowing her to patch systems without interfering with traffic to her web servers. What type of technology should she deploy?
A. A load balancer
B. NIC teaming
C. Geographic diversity
D. A multipath network
A. A load balancer
Rick performs a backup that captures the changes since the last full backup. What type of backup has he performed?
A. A new full backup
B. A snapshot
C. An incremental backup
D. A differential backup
D. A differential backup
What type of recovery site has some or most systems in place but does not have the data needed to take over operations?
A. A hot site
B. A warm site
C. A cloud site
D. A cold site
B. A warm site
Ben wants to implement a RAID array that combines both read and write performance while retaining data integrity if a drive fails. Cost is not a concern compared to speed and resilience. What RAID type should he use?
A. RAID 1
B. RAID 5
C. RAID 6
D. RAID 10
D. RAID 10
Cynthia wants to clone a virtual machine. What should she do to capture a live machine, including the machine state?
A. A full backup
B. A snapshot
C. A differential backup
D. A LiveCD
B. A snapshot
Sally is working to restore her organization’s operations after a disaster took her datacenter offline. What critical document should she refer to as she restarts systems?
A. The restoration order documentation
B. The TOTP documentation
C. The HOTP documentation
D. The last-known good configuration documentation
A. The restoration order documentation
Mike wants to stop vehicles from traveling toward the entrance of his building. What physical security control should he implement?
A. An air gap
B. A hot aisle
C. A robotic sentry
D. A bollard
D. A bollard
Amanda wants to securely destroy data held on DVDs. Which of the following options is not a suitable solution for this?
A. Degaussing
B. Burning
C. Pulverizing
D. Shredding
A. Degaussing
Why are Faraday cages deployed?
A. To prevent tailgating
B. To assist with fire suppression
C. To prevent EMI
D. To prevent degaussing
C. To prevent EMI
Which of the following controls helps prevent insider threats?
A. Two-person control
B. Visitor logs
C. Air gaps
D. Reception desks and staff
A. Two-person control
Madhuri wants to implement a camera system but is concerned about the amount of storage space that the video recordings will require. What technology can help with this?
A. Infrared cameras
B. Facial recognition
C. Motion detection
D. PTZ
C. Motion detection
What factor is a major reason organizations do not use security guards?
A. Reliability
B. Training
C. Cost
D. Social engineering
C. Cost
Michelle wants to ensure that attackers who breach her network security perimeter cannot gain control of the systems that run the industrial processes her organization uses as part of their business. What type of solution is best suited to this?
A. An air gap
B. A Faraday cage
C. A cold aisle
D. A screened subnet
A. An air gap
Kathleen wants to discourage potential attackers from entering the facility she is responsible for. Which of the following is not a common control used for this type of preventive defense?
A. Fences
B. Lighting
C. Robotic sentries
D. Signs
C. Robotic sentries
How does technology diversity help ensure cybersecurity resilience?
A. It ensures that a vulnerability in a single company’s product will not impact the entire infrastructure.
B. If a single vendor goes out of business, the company does not need to replace its entire infrastructure.
C. It means that a misconfiguration will not impact the company’s entire infrastructure.
D. All of the above.
D. All of the above.
Scott send his backups to a company that keeps them in a secure vault. What type of backup solution has he implemented?
A. Nearline
B. Safe
C. Online
D. Offline
D. Offline