GUIDE QUESTIONS AND COMPLETE
SOLUTIONS VERIFIED PRACTICE PACK
GRADED A+
⩥ As part of routine maintenance, your organization requires that system
administrators perform a routine access review and audit. As part of this
process, you decide to audit user access to files and folders.
Which Windows audit policy should you enable?
A Directory service access
B Account logon events
C Logon events
D Object access.
Answer: D
⩥ You have been asked to implement network monitoring that detects
any changes or deviations in network traffic. While setting up the
monitoring, you establish network traffic baselines.
Which type of monitoring are you implementing?
,A anomaly-based
B network-based
C behavior-based
D signature-based.
Answer: A
⩥ While developing the business continuity plan, your team must create
a plan that ensures that normal operation can be resumed in a timely
manner.
Which element is your team creating?
A business continuity plan
B business impact analysis (BIA)
C disaster recovery plan
D vulnerability analysis.
Answer: C
⩥ The business continuity committee has developed the business impact
analysis (BIA), identified the preventative controls that can be
implemented, and developed the recovery strategies. Next, the
committee should develop a contingency plan.
,Which teams should be included in this plan's development to aid in the
execution of the final plan? (Choose 3)
A restoration team
B damage assessment team
C salvage team
D risk management team
E incident response team.
Answer: ABC
⩥ Which part of a computer system should be inspected for hidden files
and data?
A slack space
B custody space
C tight space
D bit space.
Answer: A
⩥ When should you install a software patch on a production server?
, A when the patch is in beta format
B before the patch has been tested
C after the patch has been tested
D immediately after the patch is released.
Answer: C
⩥ You must document the appropriate guidelines that should be included
as part of any security policy that involves personnel who travel with
company-issued devices. You have been given a list that should be
included in the guidelines as follows:
A Transport devices in checked baggage.
B Use encryption when possible.
C Do not leave the device unattended.
D Do not use WiFi networks.
Which of the above guidelines should be included as part of the
guidelines for personnel? (Choose 3).
Answer: BCD
⩥ Which term is an estimate of the amount of time a piece of equipment
will last and is usually determined by the equipment vendor or a third
party?