You have been asked to implement a RAID 5 solution for your network. What is the minimum number of hard disks that can be used to configure RAID 5? |
3 |
Which of the ff. drive configurations is fault tolerant? |
RAID 5 |
You have a Web server on your network that hosts the public Web site for your company. You want to make sure that the Web site will continue to be available even if a NIC, hard drive, or other problem prevents the server from responding. Which solution should you implement? |
Load balancing |
You manage the website for your company. The web1 server hosts the website. This server has the ff. configuration: |
Disk controller |
What is an advantage of RAID 5 over RAID 1? |
RAID 5 improves performance over RAID 1 |
What is the primary security feature that can be designed into a network’s infrastructure to protect and support availability? |
Redundancy |
Which of the ff. terms describes the actual time required to successfully recover operations in the event of an incident? |
Recovery Time Objective (RTO) |
Which form of alternate site is the cheapest but may not allow an organization to recover before reaching their maximum tolerable downtime? |
Reciprocal agreement |
Which of the ff. network strategies connects multiple servers together such that if one server fails, the others immediately take over its tasks, preventing a disruption in service? |
Clustering |
When should a hardware device be replaced in order to minimize downtime? |
Just before its MTBF is reached |
Daily backups are done at the ABD company location and only a weekly backup is maintained at another network location. Which of the ff. disaster recovery strategies is ABD using? |
Warm site |
You manage a Web site for your company. The Web site uses three servers configured in a cluster. Incoming requests are distributed automatically between the three servers. All servers use a shared storage device that holds the website contents. Each server has a single network connection and a single power supply. Considering the availability of your website, which components represent a single point of failure? |
Website storage |
Which of the ff. is a recovery site that may have electricity connected, but there are no servers installed and no high-speed data lines present? |
Cold site |
You have been asked to deploy a network solution that requires an alternate location where operational recovery is provided within minutes of a disaster. Which of the ff. strategies would you choose? |
Hot site |
You manage the website for your company. The website uses a cluster of two servers with a single shared storage device. The shared storage device uses a RAID 1 configuration. Each server has a single connection to the shared storage, and a single connection to your ISP. You want to provide redundancy such that a failure in a single component does not cause the website to be unavailable. What should you add to your configuration to accomplish this? |
Connect one server through a different ISP to the Internet |
Your network uses the ff. backup strategy: |
4 |
What does an incremental backup do during the backup? |
Backs up all files with the archive bit set; resets the archive bit. |
Which backup strategy backs up only files which have the archive bit set, but does not mark them as having been backed up? |
Differential |
Which of the ff. are backed up during a differential backup? |
Only files that have changed since the last full backup. |
Your organization uses the ff. tape rotation strategy for its backup tapes: At the end of each week, the latest daily backup tape is promoted to be the weekly backup tape. At the end of the each month, one of the weekly backup tapes is promoted to be the monthly backup tape. What kind of backup tape rotation strategy is being used? |
Grandfather |
Which of the ff. are backed up during an incremental backup? |
Only files that have changed since the last full or incremental backup. |
What does a differential backup do during the backup? |
Backs up all files with the archive bit set; does not reset the archive bit. |
A system failure has occurred. Which of the ff. restoration processes would result in the fastest restoration of all data to its most current state? |
Restore the full backup and the last differential backup |
Your network uses the ff. backup strategy: |
2 |
Why should backup media be stored offsite? |
To prevent the same disaster from affecting both the network and the backup media |
The disaster recovery plan calls for having tape backups stored at a different location. The location is safe deposit box at the local bank. Because of this, the disaster recovery plan specifies to choose a method that uses the fewest tapes, but is also quick to back up and restore files. Which backup strategy would best meet the disaster recovery plan for tape backups? |
Perform a full back up once a week with a differential back up the other days of the week. |
Even if you perform regular backups, what must be done to ensure that you protected against data loss? |
Regularly test restoration procedures |
Which backup strategy backs up all files from a computer’s file system regardless of whether the file’s archive bit is set or not marks them as having been backed up? |
Full |
To increase your ability to recover from a disaster, where should you store backup tapes? |
At the vice president’s home. |
Your network performs a full back up every night. Each Sunday, the previous night’s backup tape is archived. Wednesday morning the storage system fails. How may restore operations will you need to perform to recover all of the data? |
1 |
Which of the ff. security solutions would prevent a user from reading a file which she did not create? |
EFS |
You want a security solution that protects the entire hard drive, preventing access even when it is moved to another system. Which solution would you choose? |
BitLocker |
You want to protect data on hard drives for users with laptops. You want the drive to be encrypted, and you want to prevent the laptops from booting unless a special USB drive is inserted. In addition, the system not boot if a change is detected in any of the boot files. What should you do? |
Implement BitLocker with a TPM |
You create a new document and save it to a hard drive on a file server on your company’s network. Then, you employ an encryption tool to encrypt the file using AES. This activity is an example of accomplishing what security goal? |
Confidentiality |
You would like to implement BitLocker to encrypt data on a hard disk even if it moved to another system. You want the system to boot automatically without proving a startup key on an external USB device. What should you do? |
Enable TPM in the BIOS |
Which of the ff. security measure encrypts the entire contents of a hard drive? |
DriveLock |
Which of the ff. is a secure alternative to FTP that uses SSL for encryption? |
FTPS |
Which of the ff. protocols can TLS use for key exchange? (Select two.) |
Diffie-Hellman, RSA |
Which of the ff. protocols are often added to other protocols to provide secure transmission of data? (Select two.) |
TLS, SSL |
Which of the ff. protocols can be used to securely manage a network device from a remote connection? |
SSH |
SSL (Secure Socket Layer) operates at which layer of the OSI model? |
Session |
IPSec is implemented through two separate protocols. What are these protocols called? (Select two.) |
AH, ESP |
What is the primary function of the IKE policy used with IPSec? |
Create a security association between communicating partners. |
SFTP uses which mechanism to provide security for authentication and data transfer? |
SSH |
Which of the ff. network layer protocols provides authentication and encryption services for IP based network traffic? |
IPSec |
Which protocol does HTTPS use to offer security in Web transactions? |
SSL |
Which protocol is used for securely browsing a Web site? |
HTTPS |
You are purchasing a hard disk over the Internet from an online retailer. What does your browser use to ensure that others cannot see your credit card number on the Internet? |
SSL |
As network administrator you are asked to recommend a secure method of transferring data between hosts on a network. Which of the ff. protocols would you recommend? (Select two.) |
SCP, SFTP |
What is the default encryption algorithm used by SSH (Secure Shell) to protect data traffic between a client and the controlled server? |
IDEA |
When using SSL authentication, what does the client verify first when checking a server’s identity? |
The current date and time must fall within the server’s certificate validity period. |
Which of the ff. best describes the Platform as a Service (PaaS) cloud computing service model? |
PaaS delivers everything a developer needs to build an application onto the cloud infrastructure. |
Which of the ff. is not true regarding cloud computing? |
Cloud computer requires end-user knowledge of the physical location and configuration of the system that delivers the services. |
Which of the ff. cloud computing solutions will deliver software applications to a client either over the Internet or on a local area network? |
SaaS |
Chapt 10 security
Share This
Unfinished tasks keep piling up?
Let us complete them for you. Quickly and professionally.
Check Price