Security+ Random Questions 3 Flashcards
What is an administrative means to prevent users from installing unapproved software on clients?
Have them sign an acceptable use policy
Which of the following methods provide fault tolerance for data storage?
RAID, Data backup, Clustering
Which device is used to connect voice, data, pagers, networks, and almost any other conceivable application into a single telecommunications system?
PBX
Which of the following RAID levels is a striped disk with the dual distributed parity?
Level 6
Which of the following functions of the incident handling process involves in-depth investigation of the incident report or incident activity to establish the priority, and threat of the incident?
Incident analysis
Which of the following is used to allow or deny access to network resources?
ACL
You work as network administrator for Net Perfect Inc. The company has a TCP/IP-based Windows NT network. You’re configuring a computer that will be used as a file server on the network. You have to decide the disk configuration for the computer to obtain better performance. A fault-tolerant disk configuration is not a requirement. Which of the following RAID levels will you choose to fulfill the requirement?
Level 0
To gain more insights into the processes of a company, the company changes the positions of employees. Which of the following is an example of this practice?
Job rotation
As a security administrator, you have implemented privacy screens and password protected screen savers on all servers and client computers. Which of the following attacks are you trying to mitigate?
Shoulder surfing
Which of the following protocols protects the password and data during FTP communications between a client and server?
SFTP
Which of the following is a network management device that sits between different network segments and allows them to communicate with another?
Router
What form of transmission encapsulates the payload of a packet but leaves the header in its original form?
Transport Mode
Which of the following items is considered unimportant by a Dumpster diver when searching through a company’s trash bins?
Public website page proofs
You have been asked to give a speech on security to upper management. What are two primary access control methods that you should mention that are commonly combined in computer systems today?
RBAC, DAC
Which of the following is the criminal practice of using social engineering over the telephone system?
Vishing