Net+ Session 3 Post-lab follow-up Flashcards
A business need exists for a business to make sure they can be up and running at a moment's notice in case of a disaster. What type of site needs to be set up? A - Hot B - Cold C - Warm D - Urgent
A - Hot
What is the implementation of policies, controls, and procedures to recover from a disaster called? A - Hot site planning B - Warm site planning C - Business continuity planning D - Disaster recovery planning
C - Business continuity planning
What is the most important reason for keeping legacy systems on a separate network segment?
A - Legacy systems are often not supported
B - Legacy systems can slow down the network
C - Legacy systems are often incompatible with the current network
D - Legacy systems are often incompatible with the current server operating system
A - Legacy systems are often not supported
A business has five main applications. One is subject to HIPAA requirements. What is the best way to secure the overall network?
A - Host the HIPAA application virtually
B - Host the HIPAA application on a different subnet
C - Make sure all five applications conform to HIPAA requirements
D - Train all users in HIPAA requirements, even if they do not use the HIPAA application
B - Host the HIPAA application on a different subnet
What type of update is most common to a router? A - OS B - Driver C - Feature D - Firmware
D - Firmware
What type of update is most commonly associated with enhancing device functionality? A - OS B - Driver C - Feature D - Firmware
B - Driver
Which of the following updates would be considered a major update? A - 3.1.7 B - 3.0.0 C - 3.1.1 D - 3.1.1.1
B - 3.0.0
Why should vulnerability patches be installed as soon as possible? A - They fix viruses B - They offer new features C - They fix functionality issues D - They fix potential security threats
D - They fix potential security threats
In which type of policy do users acknowledge that their network activity is being tracked? A - Network B - Security C - Acceptable use D - Consent to monitoring
D - Consent to monitoring
Which policy addresses the use of personal USB drives on corporate machines? A - Network B - Security C - Acceptable use D - Consent to monitoring
C - Acceptable use
Which is the best first step in avoiding user risk in network security? A - Business continuity B - Vulnerability scanning C - End-user awareness and training D - Adherence to standards and policies
C - End-user awareness and training
A network administrator is about to make a major update to a server. The administrator wants to take a snapshot of the current configuration so that the update can be rolled back if needed. What is this snapshot called? A - Baseline B - Graphing C - Log management D - Asset management
A - Baseline
Which is true about on-boarding and off-boarding a mobile device?
A - On-boarding involves placing it on the network while off-boarding involves removing it from the network
B - On-boarding involves placing it on the network while off-boarding involves removing company-owned applications and resources
C - On-boarding is the process of getting a mobile device ready for network connectivity while off-boarding involves removing it from the network
D - On-boarding is the process of getting a mobile device ready for network connectivity while off-boarding involves removing company-owned applications and resources
D - On-boarding is the process of getting a mobile device ready for network connectivity while off-boarding involves removing company-owned applications and resources
What is the role of a first responder?
A - To start chain of custody
B - To start forensics analysis
C - To be the first to collect evidence in an incident
D - To see if a potential security incident is indeed an incident
D - To see if a potential security incident is indeed an incident
What is the release of secure information to an untrusted environment known as? A - Data breach B - Data incident C - Information breach D - Information incident
A - Data breach
A network administrator wants to exploit weaknesses in network security. What should the administrator conduct? A - Session hijacking B - Social engineering C - Penetration testing D - Vulnerability scanning
C - Penetration testing
What is the main method for a denial of service (DoS) attack?
A - Turn off all network services
B - Attack and turn off all of the routers in a network
C - Take over the administrator account and change its password
D - Overload a network with traffic so that there is no bandwidth left
D - Overload a network with traffic so that there is no bandwidth left
Which is a collection of computers that contain malicious software that can be controlled remotely? A - Botnet B - Zombie C - Keylogger D - Trojan horse
A - Botnet
A flood of ping requests have come into the network, causing the regular network functionality to slow down, and, in some cases, stop. What is this best described as? A - Botnet B - Traffic spike C - Smurf attack D - Coordinated attack
B - Traffic spike
A user calls the help desk and says that when accessing an internal website, the user is being redirected to a site that is asking for personal information. This is most likely what type of attack? A - DNS B - Phishing C - Spoofing D - ARP cache poisoning
A - DNS
A network attack in which an attacker sends a UDP request to a server managing time and then gets a response containing multiple responses is what type of attack? A - NTP B - DNS C - Smurf D - Kerberos
A - NTP
A junior network administrator is learning about DoS attacks. The administrator stages an NTP attack. The only problem is the administrator thought he/she was on the testing network but this was done in production. What type of DoS attack is this? A - Inside B - Physical C - Distributed D - Unintentional
D - Unintentional
A DoS attack on a network has taken place. Upon examining the situation, it is determined that the only way to end the attack is to change the IP address of the router on the network. What type of DoS attack has taken place? A - Reflective B - Distributed C - Permanent D - Unintentional
C - Permanent
What type of attack involves a TCP attack in which packets are never acknowledged? A - Reflective B - SYN flood C - ACK flood D - Brute force
B - SYN flood