Module 14 Flashcards
Which of the following is a document that outlines specific requirements or rules that must be met?
Policy
Guideline
Specification
Framework
Policy - Correct. A policy is a document that outlines specific requirements or rules that must be met.
Which of the following is NOT an element that should be part of a BCP?
High availability
Diversity
Robustness
Scalability
Robustness - Correct. Robustness is not part of a BCP.
Which of the following is NOT true about RAID?
- Nested levels can combine other RAID levels.
- It can be implemented in hardware or software.
- The most common levels of RAID are Level 0, 1, 5, 6, and 10.
- It is designed primarily to backup data.
It is designed primarily to backup data. - Correct. Although all levels of RAID except Level 0 can offer protection from a single drive failure, RAID is not intended to replace data backups but only to provide increased reliability and performance.
Which of the following is a federal initiative that is designed to encourage organizations to address how critical operations will continue under a broad range of negative circumstances?
COOP
MTBF
DPPR
BIA
- Correct. Continuity of operation planning (COOP) is a federal initiative that is intended to encourage organizations (and departments with an organization) to address how critical operations will continue under a broad range of negative circumstances. A COOP plan addresses emergencies from an “all-hazards approach” instead of focusing more narrowly on a specific event.
What do servers connected in a cluster use to communicate with each other?
- Shared disk connection
- Public cluster connection
- Private cluster connection
- Independent cluster connection
Correct. Servers in a cluster communicate through a private cluster connection to ensure a smooth user experience.
You are a security admin for an enterprise, and you were asked to ensure high availability of data using redundancy. Which of the following action should you perform?
- Store the same data in different devices in a single location
- Store different types of data on different devices in a single location
- Store different types of data on different devices across different locations
- Store the same data in different devices across different locations
Correct. Storing the same data on different devices across different locations provides high availability of data through redundancy.
You want to examine every future login attempt made on the enterprise devices. Which of the following windows group policy settings should you enable to make sure every login attempt is logged?
Network location
Account audits
Password history
Password reuse
Correct. Account audits log every login attempt when enabled.
“Keep passwords secure and do not share accounts. Authorized users are responsible for the security of their passwords and accounts.” “All computers and laptops should be secured with a password-protected screensaver, setting the automatic activation feature set at 10 minutes or less, or logging off when the host is unattended.”
Which policy includes these directives?
- Onboarding and offboarding
- Least Privilege
- Separation of duties
- Acceptable use policy
Correct. An acceptable use policy (AUP) is a policy that defines the actions users may perform while accessing systems and networking equipment.
Which of the following is an agreement that ensures an employee does not misuse enterprise data?
Data protection agreement
Impossible travel policy
Nondisclosure agreement
Acceptable use policy
Correct. New hires are often required to sign an employee nondisclosure agreement (NDA) to make it clear that they may not disclose trade secrets and confidential information without permission.
You are asked to construct a server cluster to provide resilience to the webserver hosted by your enterprise. Which of the following clustering systems should you implement to ensure the standby server only works when the other server fails?
Symmetric
Independent
Asymmetric
Unique
- Correct. In asymmetric clustering systems, the standby server only works when the other server fails.
You are working as a cybersecurity expert in an enterprise. While examining the newly established enterprise network, you found that when a request to write data to the drive is made, the controller sends that request to each drive. When a read action is required, the data is read twice, once from each drive. Which type of RAID is used in the newly established network?
RAID level 5
RAID level 6
RAID level 1
RAID level 0
Correct. RAID level 1 uses disk mirroring, which stores the same data on different drives, for fault tolerance.
Which of the following can a UPS NOT perform?
- Disconnect users and shut down the server
- Prevent any new users from logging on
- Prevent certain applications from launching that will consume too much power
- Notify all users that they must finish their work immediately and log off
Correct. A UPS cannot prevent specific applications from launching to limit power consumption.
Which type of site is essentially a duplicate of the production site and has all the equipment needed for an organization to continue running?
Cold site
Hot site
Replicated site
Warm site
Correct. A hot site is generally run by a commercial disaster recovery service that allows a business to continue computer and network operations to maintain business continuity. A hot site is essentially a duplicate of the production site and has all the equipment needed for an organization to continue running, including office space and furniture, telephone jacks, computer equipment, and a live telecommunications link.
What device is always running off its battery while the main power runs the battery charger?
Secure UPS
Backup UPS
Offline UPS
Online UPS
Correct. An online UPS is always running off its battery while the main power runs the battery charger. An advantage of an online UPS is that it is not affected by dips or sags in voltage. An online UPS can clean the electrical power before it reaches the server to ensure that a correct and constant level of power is delivered to the server. The online UPS also can serve as a surge protector, which keeps intense spikes of electrical current—common during thunderstorms—from reaching systems.
You are assigned to install multiple physical paths between devices and the SAN so that an interruption in one path will not affect communication. Which of the following techniques should you implement to manage the risk of interruption?
PDU
UPS
Multipath
NIC teaming
Correct. Multipath is a technique for creating more than one physical path between devices and a SAN. If one path is interrupted, multipath will simply redirect the broken connection to another path.