Resiliency and Automation Strategies Flashcards

1
Q

Which of the following correctly describes a resilient system?

A system with defined configuration and setup strategies

A system using snapshots and reverting to known states

A system that can return to normal operating conditions after an upset

A

A system that can return to normal operating conditions after an upset

A resilient system is one that can return to normal operating conditions after a disruption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following correctly describes automation as discussed in this chapter?

The configuration of redundant and fault-tolerant systems

The use of short programs to perform tasks otherwise performed manually by keyboard entry.

The proper use of configuration definitions and setup

A

The use of short programs to perform tasks otherwise performed manually by keyboard entry.

Automation in the context of systems administration is the use of tools and methods to perform tasks otherwise performed manually by humans, thereby improving efficiency and accuracy and reducing risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following is not an advantage of using scripts?

Reducing the chance of error

Performing change management on the scripts

Avoiding time-consuming activities to correct mistakes

A

Performing change management on the scripts

Performing change management on the scripts is not an advantage of using them. Reducing the chance of error, avoiding time-consuming activities to correct mistakes, and automating complex tasks by chaining scripts together are all advantages of using scripts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the Security Content Automation Protocol (SCAP) used for?

To enumerate common vulnerabilities

To secure networks

To provide automation methods for managing vulnerabilities

A

To provide automation methods for managing vulnerabilities

SCAP provides automation methods for managing vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following is a true statement regarding automated courses of action?

They are often unwieldy and error prone.

They induce errors into system management.

They reduce errors.

A

They reduce errors.

The bottom-line statement about the value of automated courses of action is that they reduce errors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following correctly defines continuous monitoring?

The operational process by which you can confirm if controls are functioning properly

An ongoing process to evaluate the utility of flat-screen monitors

A dashboard that shows the status of systems

A

The operational process by which you can confirm if controls are functioning properly

Continuous monitoring is the operational process by which you can confirm if controls are functioning properly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Why is automated testing an important part of configuration validation?

It can scale and be used in continuous monitoring.

It can compare before and after versions of a given system.

It can automatically confirm the validity of a configuration

A

It can scale and be used in continuous monitoring.

Automated testing is an important part of configuration validation because it can scale and be used in continuous monitoring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is an advantage of using templates?

They reduce the need for customers to test configurations.

They resolve patching problems.

They allow rapid, error-free creation of systems and services, including configurations, connection of services, testing, and deployment.

A

They allow rapid, error-free creation of systems and services, including configurations, connection of services, testing, and deployment.

An important capability of templates is that they allow rapid, error-free creation of systems and services, including configurations, connection of services, testing, and deployment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following correctly describes master images?

They work well for small corporations, but they don’t scale.

They require extensive change management efforts.

They are key elements of template-based systems.

A

They are key elements of template-based systems.

Master images are key elements of template-based systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following are benefits of using a master image?

They make administrative tasks easier to automate.

They make administrative tasks simpler.

They substantially reduce the number of human errors.

All of the above.

A

All of the above.

Master images make administrative tasks easier to automate, make administrative tasks simpler, and substantially reduce the number of human errors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Non-persistence systems can reduce risk because?

They can function in constantly evolving environments.

They enable end users to change their computers as much as they want.

They do not allow users to save changes to configuration or applications.

A

They do not allow users to save changes to configuration or applications.

Non-persistence does not allow saving changes to configuration or applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a major benefit provided by snapshots?

If a change contains errors, it is easy to revert to the previous configuration.

Snapshots can retain a large number of photos.

Because they are instantaneous savepoints on a machine, they do not need to be retained.

A

If a change contains errors, it is easy to revert to the previous configuration.

A major benefit provided by snapshots is that if a change contains errors, it is easy to revert to the previous configuration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is an important point to understand about reverting to a known state?

Reverting to a known state can result in loss of a user’s files.

Reverting to a known state typically only protects the operating system and associated files.

Reverting to a known state does not allow removing an error caused by change.

A

Reverting to a known state typically only protects the operating system and associated files.

Reverting to a known state typically only protects the operating system and associated files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the difference between reverting to a known state and rolling back to a known configuration?

Reverting to a known state can effect more than just the OS.

Rolling back to a known configuration is a change to the system configuration, not necessarily what it is working on.

Both A and B.

A

Both A and B.

Reverting to a known state is rolling back to a restore point—this effects the OS and any processes currently running with saved values. Rolling back to a known configuration restores the registry values to a known good configuration, but does not change user values

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a key principle about elasticity?

You can configure systems to scale up and down, so you only pay for the resources used.

Elasticity works very well with on-premises equipment.

Scaling up and down both result in increased charges.

A

You can configure systems to scale up and down, so you only pay for the resources used.

A key principle about elasticity is that you can configure systems to scale up and down, so you only pay for the resources used

How well did you know this?
1
Not at all
2
3
4
5
Perfectly