Lesson 20: Implementing Cybersecurity Resilience Flashcards

1
Q

A company is working to restore operations after a blizzard stopped all operations. Evaluate the order of restoration and determine the correct order of restoring devices from first to last.

A. Routers, firewalls, Domain Name System (DNS), client workstations

B. Domain Name System (DNS), routers, firewalls, client workstations

C. Firewalls, routers, Domain Name System (DNS), client workstations

D. Routers, client workstations, firewalls, Domain Name System (DNS)

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A Redundant Array of Independent Disks (RAID) is installed with data written to two disks with 50% storage efficiency. Which RAID level has been utilized?

A. Level 0

B. Level 1

C. Level 5

D. Level 6
A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A natural disaster has resulted in a company moving to an alternate processing site. The company has operations moved almost immediately as a result of having a building with all of the equipment and data needed to resume services. The alternative site was actively running prior to the natural disaster. Evaluate the types of recovery sites to determine which processing site the company is utilizing.

A. Replication site
B. Cold site
C. Warm site
D. Hot site

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A recent systems crash prompts an IT administrator to perform recovery steps. Which mechanism does the administrator use to achieve nonpersistence?

A. Configuration validation

B. Data replication

C. Restoration automation

D. Revert to known state

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A systems engineer decides that security mechanisms should differ for various systems in the organization. In some cases, systems will have multiple mechanisms. Which types of diversity does the engineer practice? (Select all that apply.)

A. Control

B. Vendor

C. Change

D. Resiliency

A

A,B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Management has reason to believe that someone internal to the organization is committing fraud. To confirm their suspicion, and to collect evidence, they need to set up a system to capture the events taking place. Evaluate which option will best fit the organization’s needs.

A. Honeynet

B. Honeypot

C. Exploitation framework

D. Metasploit

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A hurricane has affected a company in Florida. What is the first step in the order of restoration?

A. Enable and test switch infrastructure

B. Enable and test power delivery systems

C. Enable and test network security appliances

D. Enable and test critical network servers

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

An organization stores data in different geographic locations for redundancy. This data replicates so that it is the same in all locations. Engineers discover that some replicas are lagging with updates. What configuration do the engineers discover as the cause?

A. Asynchronous replication

B. Synchronous replication

C. On-premises location

D. Cloud location

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A systems engineer reviews recent backups for a production server. While doing so, the engineer discovers that archive bits on files are clearing and incorrect backup types have been occurring. Which backup type did the engineer intend to use if the bit should not be cleared?

A. Snapshot

B. Full

C. Differential

D. Incremental

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A systems engineer configures a disk volume with a Redundant Array of Independent Disks (RAID) solution. Which solution does the engineer utilize when allowing for the failure of two disks?

A. Level 1

B. Level 0

C. Level 5

D. Level 6

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Analyze automation strategies to differentiate between elasticity and scalability. Which scenarios demonstrate scalability? (Select all that apply.)

A. A company is hired to provide data processing for 10 additional clients and has a linear increase in costs for the support.

B. A company is hired to provide data processing for 10 additional clients and is able to utilize the same servers to complete the tasks without performance reduction.

C. A company has a 10% increase in clients and a 5% increase in costs.

D. A company has a 10% increase in clients and a 10% decrease in server performance.

A

A,C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

An organization configures both a warm site and a hot site for disaster preparedness. Doing so poses which difficulties for the organization? (Select all that apply.)

A. Resiliency

B. Diversity

C. Complexity

D. Budgetary

A

C,D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Security specialists create a sinkhole to disrupt any adversarial attack attempts on a private network. Which solution do the specialists configure?

A. Routing traffic to a different network

B. Using fake telemetry in response to port scanning

C. Configuring multiple decoy directories on a system

D. Staging fake IP addresses as active

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A system has a slight misconfiguration which could be exploited. A manufacturing workflow relies on this system. The admin recommends a trial of the proposed settings under which process?

A. Change management

B. Change control

C. Asset management

D. Configuration management

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

IT staff looks to provide a high level of fault tolerance while implementing a new server. With which systems configuration approach does the staff achieve this goal?

A. Adapting to demand in real time

B. Adding more resources for power

C. Focusing on critical components

D. Increasing the power of resources

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly