Failed Test Questions 1,2,3,4,5,12 – Flashcards
Unlock all answers in this set
Unlock answersquestion
You have a small network that uses a hub to connect multiple devices. What physical topology is used
answer
Star
question
Which of the following topologies connects all devices to a trunk cable?
answer
Bus
question
Which of the following cable types often includes a solid plastic core?
answer
Cat 6
question
Which of the following topologies connects each network device to a central hub?
answer
Star
question
You have implemented and ad-hoc wireless network that doesn't employ a wireless access point. Every wireless network card can communicate directly with any other wireless network card on the network.
answer
Mesh
question
You want to implement a fault tolerant topology as you interconnect routers on your wide area network. Which of the following would meet your needs?
answer
Mesh
question
Which of the following connectors is used with Ethernet 10BaseT networks?
answer
RJ-45
question
Which of the following topologies connects each device to a neighboring device?
answer
ring
question
You want to implement a fault tolerant topology as you interconnect routers on your wide area network. Which of these would meet your needs?
answer
Mesh
question
You have a small network that uses a hub to connect multiple devices. What physical topology is used?
answer
Star
question
You are an application developer and are writing a program to exchange video files through a TCP/IP network. You need to select a transport protocol that will guarantee delivery. Which TCP/IP protocol would you implemt that provides this capability?
answer
T.C.P Transmission Control Protocol-guarantees delivery through error checking and acknowledgements.
question
Your company has just acquired another company in the same city. You are given the task of integrating the two email systems so that the messages can be exchanged between the email servers. However, each network uses a different vendor
answer
SMTP Simple Mail Transfer Protocol-specifies how messages are exchanged between email servers.
question
which of the following topologies connects all devices to a trunk cable
answer
Bus
question
You have implemented a network where each device provides shared files with all other devices on the network. What type of network do you have?
answer
Peer-to-peer
question
Which of the following protocols stores email on the mail server and gives users a choice to download mail or keep it on the server?
answer
IMAP4 IMAP4 allows a mail server to hold messages for a client.
question
You have implemented an ad-hoc wireless network that doesn't employ a wireless access point. Every wireless network card can communicate directly with any other wireless network card on the network. What type of physical network topology has been implemented in this type of network?
answer
Mesh Key characteristicsof mesh- no central connecting point, any host can communicate directly with any other host on the network.
question
You have been to asked to implement a network infrastructure that will acccommodate failed connections. Which of the following network topologies provides redundancy for a failed link?
answer
Mesh
question
What protocol sends email to a mail server
answer
SMTP
question
Which of the following is NOT part of security awareness training?
answer
Employee agreement documents
question
what should you do to increase security of someones account
answer
train users not to use passwords that are easy to guess require stronger initial password when creating user account
question
which business document is a contract that defines a set of terms that will govern future agreements between two parties?
answer
Master Service Agreement
question
Steps in the Change and Configuration Management process
answer
1. Identify the need for change 2. Conduct a feasibility analysis 3. Notify affected parties of the pending change. 4. Implement the change. 5. Test the implementation 6. document the change.
question
A network utilizes a Network Access Control (NAC) solution to protect against malware. When a wired or wireless host tries to connect to the network, a NAC agent on the host checks it to make sure it has all of the latest operating system updates installed and that the latest antivirus definitions have been applied
answer
Posture assesment
question
Purchasing insurance is what type of response to risk?
answer
transference
question
SLA
answer
Service level agreement Specifies exactly which services will be preformed by each party Defines how disputes will be managed
question
BPO
answer
Business process outsourcing Creates an agreement with a vendor to provide services on an ongoing basis Specifies a preset discounted pricing structure
question
MOU
answer
Memorandum of understanding Provides a summary of which party is responsible for performing specific tasks
question
ISA
answer
Documents how the networks will be connected
question
When analyzing assets, which analysis method assigns financial values to assets?
answer
Quantitative
question
A security admin needs to run a vulnerability scan that will analyze a system from the perspective of a hacker attacking the organization from the outside. what type of scan would you use?
answer
Non-credentialed scan
question
In business continuity planning, what is the primary focus of the scope?
answer
Business process
question
what is the most common failure of a security policy in an environment?
answer
Lack of user awareness
question
what is the best action to take to make remembering passwords easier so that the person doesn't have to write it dowm?
answer
Implement end-user training
question
which of the following is defined as a contract which prescribes the technical support or business parameters that a provider will bestow to its client?
answer
Service level agreement
question
which of the following is an example of privilege escalation?
answer
Creeping priviliges
question
Which of the following network strategies connects multiple servers together such that if one server fails the other immediately take over its tasks preventing a disruption in service
answer
Clustering
question
Ongoing operations
answer
Communicate vulnerability assessment findings with other party conduct regular security audits
question
Onboarding
answer
identify how privacy will be protects draft an isa Compare your organizations security policies against the partners poolicies.
question
Off boarding
answer
disable VPN configurations that allow partner access to your network Disable the domain trust reationship between networks