CH18 - Course Quiz Flashcards
The ___________ defines who may access the Network, how they may access the Network, and what they can access?
Network Access Policy
Service-Level Agreement (SLA)
Multi-Source Agreement (MSA)
Statement of Work (SoW)
Network Access Policy
The main method by which a first responder secures an area is by having their presence at the scene?
True
False
True
Which secondary location is a complete duplicate of the Primary Site?
local
physical
hot
cold
hot
International export controls restrict the export of some kinds of hardware and software along with more obvious things like weapons to specific countries?
True
False
True
With ____________ deployment, employees are presented with a Whitelist of preapproved applications that they may install on a corporate device?
Corporate-Owned, Personally Enabled (COPE)
Corporate-Owned, Business Only (COBO)
Personally-Owned, Personally Enabled (POPE)
Chose Your Own Device (CYOD)
Corporate-Owned, Personally Enabled (COPE)
Which tool is an Open-Source tool for Penetration Testing pretty much every aspect of Wireless Networks?
Kali Linux
Aircrack-ng
Armitage
OpenVAS
Aircrack-ng
The __________________ factor indicates the length of time a device is expected to last in operation?
mean time between failures (MTBF)
mean time to repair (MTTR)
mean time to vulnerability (MTTV)
mean time to failure (MTTF)
mean time to failure (MTTF)
Explanation:
Mean Time to Failure (MTTF) - Length of time a device is expected to last in operation.
Mean Time between Failures (MTBF) - Applies to hardware components, manufacturer’s best guess regarding how much time will past between major failures of the component.
Mean Time to Repair (MTTR) - The amount of time it takes to fix a system after it fails.
Network access policies may be embedded into policies such as VPN Policy, Password Policy, Encryption Policy, and many others?
True
False
True
Which two tools dominate the Vulnerability Testing arena?
Aircrack-ng and Metasploit
Nessus and OpenVAS
Kali Linux and Microsoft Baseline Security Analyzer (MBSA)
Nmap and Microsoft Baseline Security Analyzer (MBSA)
Nessus and OpenVAS
If the disaster requires actions offsite from the primary infrastructure, it is under the jurisdiction of ________________?
business continuity
disaster recovery
change management
incident response
business continuity
Business continuity handles everything related to recovery infrastructure from a disaster except incidents that require moving part of the organization’s business offsite?
True
False
False
If an incident can no longer be contained, causing significant damage or danger to the immediate infrastructure, it is covered under __________?
change management
disaster recovery
business continuity
incident response
disaster recovery
Anything that negatively affects an organization, that hurts or comprimises its people, systems, or ability to function as an entity, is a ___________________?
vulnerability
asset
incident
contingency
incident
It doesn’t always happen this way, but its best for everyone involved if there’s a smooth ______________ procedure to ensure new members of an organization get everything they need to settle in efficently and a careful ___________________ procedure to reverse these when they leave the organization?
offboarding, onboarding
continuity, contingency
risk, recovery
onboarding, offboarding
onboarding, offboarding
Which term is used for all the customized settings for a Router, Switch, Load Balancer, Intrusion Detection/Prevent System (IDS/IPS), Firewall, or other Network Device?
computer forensics
configuration data
contingency plans
sucession plans
configuration data
Every asset has some weakness that makes it potentially susceptible to a threat?
True
False
True
Which is a legal document that prohibits the signer from disclosing any company secrets learned as part of his or her job?
Multi-Source Agreement (MSA)
Nondisclosure Agreement (NDA)
Service-Level Agreement (SLA)
Statement of Work (SOW)
Nondisclosure Agreement (NDA)
A proper assessment of a backup plan records how much data might be lost and how long it would take to restore?
True
False
True
Which document defines the duties parties commit to perform for each other and a time frame for the commitment?
Memorandum of Understanding (MOU)
Service-Level Agreement (SLA)
Multi-Source Agreement (MSA)
Statement of Commitment (SOC)
Memorandum of Understanding (MOU)
With a _________________ site, everything of note is stored in the cloud, including servers, client machine images, applications, and data?
physical
cloud
hot
cold
cloud
Most restored systems have the same amount of lost data based on when the last backup took place?
True
False
True