Last Updated on October 29, 2019 by Admin
Cybersecurity Essentials 1.1 Chapter 6 Quiz Online
CE -- Chapter 6 Quiz
Quiz-summary
0 of 17 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
Information
CE — Chapter 6 Quiz
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 17 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0)
Average score |
|
Your score |
|
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- Answered
- Review
-
Question 1 of 17
1. Question
1 pointsA user is purchasing a new server for the company data center. The user wants disk striping with parity on three disks. Which RAID level should the user implement?Correct
Incorrect
RAID 5 striping with parity would be the best choice.
Hint
RAID 5 striping with parity would be the best choice.
-
Question 2 of 17
2. Question
3 pointsA user is asked to create a disaster recovery plan for a company. The user needs to have a few questions answered by management to proceed. Which three questions should the user ask management as part of the process of creating the plan? (Choose three.)Correct
Incorrect
Disaster recovery plans are made based on the criticality of a service or process. Answers to questions of who, what, where, and why are necessary for a plan to be successful.
Hint
Disaster recovery plans are made based on the criticality of a service or process. Answers to questions of who, what, where, and why are necessary for a plan to be successful.
-
Question 3 of 17
3. Question
1 pointsA user was hired by a company to provide a highly available network infrastructure. The user wants to build redundancy into the network in case of a switch failure, but wants to prevent Layer 2 looping. What would the user implement in the network?Correct
Incorrect
Loops and duplicate frames cause poor performance in a switched network. The Spanning Tree Protocol (STP) provides a loop-free path through the switch network.
Hint
Loops and duplicate frames cause poor performance in a switched network. The Spanning Tree Protocol (STP) provides a loop-free path through the switch network.
-
Question 4 of 17
4. Question
1 pointsA security breach has happened at a major corporation. The incident team has responded and executed their incident response plan. During which phase are lessons learned applied?Correct
Incorrect
One of the key aspects of an incident response plan is to look at how monitoring can be improved and management can help minimize the impact on business. This usually occurs after the incident has been handled.
Hint
One of the key aspects of an incident response plan is to look at how monitoring can be improved and management can help minimize the impact on business. This usually occurs after the incident has been handled.
-
Question 5 of 17
5. Question
1 pointsA team has been asked to create an incident response plan for security incidents. In what phase of an incident response plan does the team get management approval of the plan?Correct
Incorrect
When creating an incident plan for an organization, the team will require management buy-in of the plan during the initial planning phase.
Hint
When creating an incident plan for an organization, the team will require management buy-in of the plan during the initial planning phase.
-
Question 6 of 17
6. Question
1 pointsA user is asked to perform a risk analysis of a company. The user asks for the company asset database that contains a list of all equipment.The user uses this information as part of a risk analysis. Which type of risk analysis could be performed?Correct
Incorrect
Physical items can be assigned a value for quantitative analysis.
Hint
Physical items can be assigned a value for quantitative analysis.
-
Question 7 of 17
7. Question
1 pointsA user is evaluating the network infrastructure of a company. The user noted many redundant systems and devices in place, but no overall evaluation of the network. In a report, the user emphasized the methods and configurations needed as a whole to make the network fault tolerant. What is the type of design the user is stressing?Correct
Incorrect
In order to deploy a resilient design, it is critical to understand the needs of a business and then incorporate redundancy to address those needs.
Hint
In order to deploy a resilient design, it is critical to understand the needs of a business and then incorporate redundancy to address those needs.
-
Question 8 of 17
8. Question
2 pointsA user has completed a six month project to identify all data locations and catalog the location. The next step is to classify the data and produce some criteria on data sensitivity. Which two steps can the user take to classify the data? (Choose two.)Correct
Incorrect
Categorizing data is a process of determining first who owns the data then determining the sensitivity of the data.
Hint
Categorizing data is a process of determining first who owns the data then determining the sensitivity of the data.
-
Question 9 of 17
9. Question
3 pointsA user needs to add redundancy to the routers in a company. What are the three options the user can use? (Choose three.)Correct
Incorrect
Three protocols that provide default gateway redundancy include VRRP, GLBP, and HSRP.
Hint
Three protocols that provide default gateway redundancy include VRRP, GLBP, and HSRP.
-
Question 10 of 17
10. Question
3 pointsA user is asked to evaluate the data center to improve availability for customers. The user notices that there is only one ISP connection, some of the equipment is out of warranty, there are no spare parts, and no one was monitoring the UPS which was tripped twice in one month. Which three deficiencies in high availability has the user identified? (Choose three.)Correct
Incorrect
A data center needs to be designed from the outset for high availability with no single points of failure.
Hint
A data center needs to be designed from the outset for high availability with no single points of failure.
-
Question 11 of 17
11. Question
1 pointsA company is concerned with traffic that flows through the network. There is a concern that there may be malware that exists that is not being blocked or eradicated by antivirus. What technology can be put in place to detect potential malware traffic on the network?Correct
Incorrect
A passive system that can analyze traffic is needed to detect malware on the network and send alerts.
Hint
A passive system that can analyze traffic is needed to detect malware on the network and send alerts.
-
Question 12 of 17
12. Question
3 pointsA user is a consultant who is hired to prepare a report to Congress as to which industries should be required to maintain five nine availability. Which three industries should the user include in a report? (Choose three.)Correct
Incorrect
Industries that are critical to everyday life like financial, healthcare, and public safety should have systems that are available 99.999% of the time (the five nines principle).
Hint
Industries that are critical to everyday life like financial, healthcare, and public safety should have systems that are available 99.999% of the time (the five nines principle).
-
Question 13 of 17
13. Question
1 pointsA user is asked to evaluate the security posture of a company. The user looks at past attempts to break into the company and evaluates the threats and exposures to create a report. Which type of risk analysis could the user perform?Correct
Incorrect
Two approaches to risk analysis are quantitative and qualitative. Qualitative analysis is based on opinions and scenarios.
Hint
Two approaches to risk analysis are quantitative and qualitative. Qualitative analysis is based on opinions and scenarios.
-
Question 14 of 17
14. Question
1 pointsA user is running a routine audit of the server hardware in the company data center. Several servers are using single drives to host operating systems and multiple types of attached storage solutions for storing data. The user wants to offer a better solution to provide fault tolerance during a drive failure. Which solution is best?Correct
Incorrect
Fault tolerance is addressing a single point of failure, in this case the hard drives.
Hint
Fault tolerance is addressing a single point of failure, in this case the hard drives.
-
Question 15 of 17
15. Question
3 pointsA user was hired as the new security officer. One of the first projects was to take inventory of the company assets and create a comprehensive database. Which three pieces of information would the user want to capture in an asset database? (Choose three.)Correct
Incorrect
Assets include all hardware devices and their operating systems.
Hint
Assets include all hardware devices and their operating systems.
-
Question 16 of 17
16. Question
1 pointsA user is redesigning a network for a small company and wants to ensure security at a reasonable price. The user deploys a new application-aware firewall with intrusion detection capabilities on the ISP connection. The user installs a second firewall to separate the company network from the public network. Additionally, the user installs an IPS on the internal network of the company. What approach is the user implementing?Correct
Incorrect
Using different defenses at various points of the network creates a layered approach.
Hint
Using different defenses at various points of the network creates a layered approach.
-
Question 17 of 17
17. Question
1 pointsThe CEO of a company is concerned that if a data breach should occur and customer data is exposed, the company could be sued. The CEO makes the decision to buy insurance for the company. What type of risk mitigation is the CEO implementing?Correct
Incorrect
Buying insurance transfers the risk to a third party.
Hint
Buying insurance transfers the risk to a third party.