Resiliency and Automation Strategies Flashcards
Which of the following correctly describes a resilient system?
A system with defined configuration and setup strategies
A system using snapshots and reverting to known states
A system that can return to normal operating conditions after an upset
A system that can return to normal operating conditions after an upset
A resilient system is one that can return to normal operating conditions after a disruption
Which of the following correctly describes automation as discussed in this chapter?
The configuration of redundant and fault-tolerant systems
The use of short programs to perform tasks otherwise performed manually by keyboard entry.
The proper use of configuration definitions and setup
The use of short programs to perform tasks otherwise performed manually by keyboard entry.
Automation in the context of systems administration is the use of tools and methods to perform tasks otherwise performed manually by humans, thereby improving efficiency and accuracy and reducing risk
Which of the following is not an advantage of using scripts?
Reducing the chance of error
Performing change management on the scripts
Avoiding time-consuming activities to correct mistakes
Performing change management on the scripts
Performing change management on the scripts is not an advantage of using them. Reducing the chance of error, avoiding time-consuming activities to correct mistakes, and automating complex tasks by chaining scripts together are all advantages of using scripts
What is the Security Content Automation Protocol (SCAP) used for?
To enumerate common vulnerabilities
To secure networks
To provide automation methods for managing vulnerabilities
To provide automation methods for managing vulnerabilities
SCAP provides automation methods for managing vulnerabilities
Which of the following is a true statement regarding automated courses of action?
They are often unwieldy and error prone.
They induce errors into system management.
They reduce errors.
They reduce errors.
The bottom-line statement about the value of automated courses of action is that they reduce errors
Which of the following correctly defines continuous monitoring?
The operational process by which you can confirm if controls are functioning properly
An ongoing process to evaluate the utility of flat-screen monitors
A dashboard that shows the status of systems
The operational process by which you can confirm if controls are functioning properly
Continuous monitoring is the operational process by which you can confirm if controls are functioning properly
Why is automated testing an important part of configuration validation?
It can scale and be used in continuous monitoring.
It can compare before and after versions of a given system.
It can automatically confirm the validity of a configuration
It can scale and be used in continuous monitoring.
Automated testing is an important part of configuration validation because it can scale and be used in continuous monitoring
What is an advantage of using templates?
They reduce the need for customers to test configurations.
They resolve patching problems.
They allow rapid, error-free creation of systems and services, including configurations, connection of services, testing, and deployment.
They allow rapid, error-free creation of systems and services, including configurations, connection of services, testing, and deployment.
An important capability of templates is that they allow rapid, error-free creation of systems and services, including configurations, connection of services, testing, and deployment
Which of the following correctly describes master images?
They work well for small corporations, but they don’t scale.
They require extensive change management efforts.
They are key elements of template-based systems.
They are key elements of template-based systems.
Master images are key elements of template-based systems
Which of the following are benefits of using a master image?
They make administrative tasks easier to automate.
They make administrative tasks simpler.
They substantially reduce the number of human errors.
All of the above.
All of the above.
Master images make administrative tasks easier to automate, make administrative tasks simpler, and substantially reduce the number of human errors
Non-persistence systems can reduce risk because?
They can function in constantly evolving environments.
They enable end users to change their computers as much as they want.
They do not allow users to save changes to configuration or applications.
They do not allow users to save changes to configuration or applications.
Non-persistence does not allow saving changes to configuration or applications
What is a major benefit provided by snapshots?
If a change contains errors, it is easy to revert to the previous configuration.
Snapshots can retain a large number of photos.
Because they are instantaneous savepoints on a machine, they do not need to be retained.
If a change contains errors, it is easy to revert to the previous configuration.
A major benefit provided by snapshots is that if a change contains errors, it is easy to revert to the previous configuration
What is an important point to understand about reverting to a known state?
Reverting to a known state can result in loss of a user’s files.
Reverting to a known state typically only protects the operating system and associated files.
Reverting to a known state does not allow removing an error caused by change.
Reverting to a known state typically only protects the operating system and associated files.
Reverting to a known state typically only protects the operating system and associated files
What is the difference between reverting to a known state and rolling back to a known configuration?
Reverting to a known state can effect more than just the OS.
Rolling back to a known configuration is a change to the system configuration, not necessarily what it is working on.
Both A and B.
Both A and B.
Reverting to a known state is rolling back to a restore point—this effects the OS and any processes currently running with saved values. Rolling back to a known configuration restores the registry values to a known good configuration, but does not change user values
What is a key principle about elasticity?
You can configure systems to scale up and down, so you only pay for the resources used.
Elasticity works very well with on-premises equipment.
Scaling up and down both result in increased charges.
You can configure systems to scale up and down, so you only pay for the resources used.
A key principle about elasticity is that you can configure systems to scale up and down, so you only pay for the resources used