failed questions Flashcards
s the network admin of a large trucking company, network troubleshooting has become a main stay of your job responsibilities. During the process of troubleshooting a problem or condition on the network that needs to be identified and rectified your selection of the correct tool becomes very important to identify the problem. Which networking tool can identify problems with the DNS and query specific DNS servers to verify it’s functionality?
Nslookup
Which of the following determines the correct response to PTI incident?
Privacy impact assessment
Privacy threshold assessment
RPO
Privacy impact assessment
Which of the following identifies system that process private information?
Privacy impact assessment
Privacy threshold assessment
RPO
Privacy threshold assessment
Which of the following is the amount of time that can elapse after a failure before system returns to normal?
Privacy impact assessment
Privacy threshold assessment
RPO
RPO
Ted is a network tech in your company and has shared his testing results with you to highlight his results. Which network tool is shown in the exhibit?
Microsoft Network Monitor
Which two are technologies that have intrinsic security weaknesses?
Operating systems
TCP/IP
When allowing BYOD in your office, you want to ensure mandatory manufacturer specific code signing on all mobile devices in the environment. Which mobile OS does NOT require this capability?
Android
Which of the following is true about voice encryption on mobile phones?
Encrypted transmissions work by adding cryptography to digitized conversations.
The acronym HTTPS identifies which of the choices listed below?
Correct answer: Hypertext Transfer Protocol Secure
Active FTP is a considerable security risk because it allows which type of connections?
inbound
You are working with a networking manager at a client’s firm, and during a planning meeting with the client, the issue of virtual machine point-in-time snapshots comes up. You recommend careful use of snapshots because of the security ramifications. Your concern involves which of the following?
Invoked snapshots will have fewer patch updates than the currently running virtual machine.
Which class represents the recommended fire suppression method for an electrical fire?
Class C (argon)
Which of the following protocols does not send credentials over the network and requires that both parties have a shared secret to compute the hash?
MS-CHAPv2
The financial institution you work for is experiencing small continued losses that were identified by the auditors as internal. Which countermeasure would you first take to stop the loss without arousing suspicion?
least privilege
The Bonanza Mining Corporation (BMC) has 26,640 hard drive units. On average they were run for 873 hours each and they experienced 21 failures, what is the MTBF for BMC? Round up your result to the nearest hour.
1,107,463
What provides secure access to corporate data in accordance with management policies?
technical controls
Instant Messaging programs have very serious security issues. Name them (3)
The communications are not encrypted.
They can provide access to sensitive or confidential data.
It is possible to transmit files that contain viruses and Trojan horses.
n cryptography, when subtle input changes make a radical change in the output, this is referred to as which of the following?
diffusion
Which term most accurately describes smartcards?
low power