managing risk Flashcards

1
Q

The best way to know the vulnerabilities of an IT infrastructure is to run what?

A

Vulnerability scanner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

When is a memorandum of understanding used?

A

When a legal contract is not appropriate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

When working inside equipment, what should Jane do?

A

Wear a properly connected anti-ESD wrist strap.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the job of a first responder?

A

React to the notification of a computer crime.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following is used to provide hot standby capabilities using paired routers?

A

CARP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which item should be found in a security policy?

A

Acceptable use policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The placement of a rack should optimize what

A

Airflow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Users need training from the IT department to understand which of the following?

A

How to secure workstations with screen-locking and password-security techniques

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

During and after a change to the IT infrastructure, what must be done?

A

he changes must be documented.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A network administrator has decided to tighten company security after a recent data breach. The new scheme calls for a strong 10 character password, a special 4 digit pin code, and a one-time use dynamic token that is accessed via a smartphone application. Which of the following is being implemented?

A

Biometric security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly