ANSWERS ALL CORRECT
The process of identifying exposure to threats, creating preventive and recovery
procedures, and then testing them to determine if they are sufficient, is known as: -
Answer- Business continuity planning and testing
What RAID type below utilizes parity data across all drives instead of using a separate
drive to hold parity error checking information? - Answer- RAID 5
What is required upon completion of an evidence examination? - Answer- a detailed
report is required that lists the steps that were taken and any evidence that was
uncovered in the forensic investigation.
____________________ is data about data. - Answer- metadata
What kind of data can be lost when a computer is turned off? - Answer- volatile
A service contract between a vendor and a client that specifies what services will be
provided, the responsibilities of each party, and any guarantees of service, is known as:
- Answer- service level agreement
Generally, ____________________ focuses on restoring computing and technology
resources to their former state. - Answer- DRP
What is the name for an image that consists of an evidence-grade backup because its
accuracy meets evidence standards? - Answer- mirror image
What access control model below is considered to be the most restrictive access control
model, and involves assigning access controls to users strictly according to the
custodian?
Mandatory Access Control
Role Based Access Control
Discretionary Access Control
Rule Based Access Control - Answer- Mandatory Access Control
Select below the access control model that uses access based on a user's job function
within an organization:
Role Based Access Control
Rule Based Access Control
,Discretionary Access Control
Mandatory Access Control - Answer- Role Based Access Control
To assist with controlling orphaned and dormant accounts, what can be used to indicate
when an account is no longer active? - Answer- Account expiration
Discuss the differences between DAP and LDAP. - Answer- -unlike X.500 DAP, LDAP
was designed to run over TCP/IP, making it ideal for Internet and intranet applications.
X.500 DAP requires special software to access the network.
-LDAP has simpler functions, making it easier and less expensive to implement.
-LDAP encodes its protocol elements in a less complex way than X.500 that enables it
to streamline requests.
A shield icon warns users if they attempt to access any feature that requires UAC
permission. - Answer- true
Entries within a Directory Information Base are arranged in a tree structure called the: -
Answer- DIT
Which access control model can dynamically assign roles to subjects based on a set of
defined rules? - Answer- Rule Based Access Control
What term is used to describe a documentation of control over evidence, which is used
to ensure that no unauthorized person was given the opportunity to corrupt the
evidence? - Answer- chain of custody
True or False:
TCP is responsible for addressing packets and sending them on the correct route to the
destination , while IP is responsible for reliable packet transmission. - Answer- False
True or False:
TCP/IP uses it own Five-layer architecture that includes Network Interface, Internet,
Control, Transport, and Application - Answer- False
True or False:
IEEE 802.1x is commonly used on wireless networks - Answer- True
True or False:
IP telephony and Voice over IP (VoIP) are identical - Answer- False
True or False:
Despite its promise to dramatically impact IT, cloud computing raises significant security
concerns - Answer- True
, What protocol suite below is the most commonly used protocol for local area network
(LAN) communication - Answer- TCP/IP
At what level of the OSI model does the IP protocol function - Answer- Network Layer
Which layer of the OSI model contains TCP protocol, which is used for establishing
connections and reliable data transport between devices - Answer- Transport Layer
The capability for devices to exchange low-level control messages is provided by what
protocol below? - Answer- ICMP
When using SNMPv1 or SNMPv2,what piece of information is needed to view
information form an agent? - Answer- community string
Select below the TCP/IP protocol that resolves a symbolic name to its corresponding IP
address using a database consisting of an organized hierarchy tree - Answer- DNS
DNS poisoning can be prevented using the latest edition of what software below? -
Answer- BIND
An administrator needs to examine FTP commands being passed to a server, what pro
should the administrator be monitoring?1 - Answer- 21
What device operates at the Network Layer (layer 3) of the OSI model and forwards
packets across computer networks - Answer- router
The deployment of this technology below can be used as a defense against DoS and
DDoS SYN flood attacks: - Answer- flood guard
Broadcast storms can be prevented by using loop prevention technology. which item be
used to help prevent loops - Answer- 802.1d
How can a network pf physical devices be grouped into logical units, regardless of what
network switches they may be connected to? - Answer- VLAN
Port-based authentication,in which users are authenticated on a per-switch pro basis, is
a function of what standard below? - Answer- IEEE 802.1x
Which of th three Cloud computing service models allows a customer to access
software provided by a vendor using a web browser, without any installation,
configuration, upgrading, or management from the user? - Answer- Cloud Software as a
Service
When setting up a server virtualization environment, what component below manages
the ritual machine operation systems and supports one or more guest systems -
Answer- hypervisor