Questions with 100% Correct
Answers
What kind of slack is created from information stored on a hard drive, which can contain
remnants of previously deleted files or data? - Answer- Drive file slack
RAID level 0 is known as disk mirroring, because it involves connecting multiple drives
in the server to the same disk controller card. - Answer- False
Using technology to search for computer evidence of a crime in order to retrieve
information, even if it has been altered or erased, that can be used in pursuit of an
attacker or criminal is an example of: - Answer- Computer forensics
When a company needs to identify mission-critical business functions and quantify the
impact a loss of such functions may have on the organization in terms of it's operational
and financial position, what should be performed? - Answer- Business impact analysis
(BIA)
The first phase of the security policy cycle involves a vulnerability assessment. -
Answer- True
Most organizations follow a three-phase cycle in the development and maintenance of a
security policy. - Answer- True
Websites that group individuals and organizations into clusters or groups based on
some sort of affiliation are considered to be what type of websites? - Answer- Social
networking
Generally considered to be the most important information security policies, what item
below defines the actions a user may perform while accessing systems and networking
equipment? - Answer- Acceptable use policies
What concept below is at the very heart of information security? - Answer- Risk
Policies that include statements regarding how an employee's information technology
resources will be addressed are part of a: - Answer- Security-related human resource
policy
, A collection of suggestions that should be implemented are referred to as a: - Answer-
Guideline
Which layer of the OSI model contains TCP protocol, which is used for establishing
connections and reliable data transport between devices? - Answer- Transport Layer
Port-based authentication, in which users are authenticated on a per-switch port basis,
is a function of what standard below? - Answer- IEEE 802.1x
How can a network of physical devices be grouped into logical units, regardless of what
network switches they may be connected to? - Answer- VLAN
What device operates at the Network Layer (layer 3) of the OSI model and forwards
packets across computer networks? - Answer- Router
TCP/IP uses its own five-layer architecture that includes Network Interface, Internet,
Control, and Application - Answer- False
In what type of cloud computing does the customer have the highest level of control? -
Answer- Cloud Infrastructure as a Service
An administrator needs to examine FTP commands being passed to a server. What port
should the administrator be monitoring? - Answer- 21
What transport protocol is used by Windows operating systems to allow applications on
separate computers to communicate over a LAN? - Answer- NetBIOS
Broadcast storms can be prevented by using loop prevention technology. Which item
below can be used to help prevent loops? - Answer- 802.1d
DNS poisoning can be prevented using the latest edition of what software below? -
Answer- BIND
When using AES-CCMP, the AES-256 bit key requires how many rounds? - Answer- 13
Which option below is responsible for the issuing of EAP request packets? - Answer-
Authenticator
Because PEAP can be vulnerable to specific types of attacks, Cisco now recommends
that users migrate to a more secure EAP than PEAP. - Answer- False
Which of the following choices is not one of the four types of packets used by EAP? -
Answer- Error