• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/20

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

20 Cards in this Set

  • Front
  • Back
As an experienced network administrator, you are responsible for infrastructure design and global configuration changes in an international company. You are asked to implement an HVAC system for Infotec. What security concern should be taken into consideration?
That any technicians have proper clearance, or are supervised
The first step in creating a security baseline would be:
creating a security policy
As an experienced network administrator, you are responsible for infrastructure design and global configuration changes. You are asked to install new servers into Infotec’s infrastructure. You have to make sure that all these servers fulfill security requirements for uptime. Where will the availability requirements be identified?
Service level agreement
You work as a network administrator for your company. Your company has just detected a malware incident. Which will be your first response?
Containment.
As an experienced technician, you notice that there is a design flaw in a new application. However, the management makes a decision to go on manufacturing the product with the flaw other than recall the software. Refer to the following risk management strategies. Which one does the management adopt?
Risk acceptance
A computer system containing personal identification information is being implemented by a company’s sales department. The sales department has requested that the system become operational before a security review can be completed. Which of the following can be used to explain the reasons why a security review must be completed?
Corporate security policy
A computer system containing personal identification information is being implemented by a company’s sales department. The sales department has requested that the system become operational before a security review can be completed. Which of the following can be used to explain the reasons why a security review must be completed?
Corporate security policy
In order to allow for more oversight of past transactions, a company decides to exchange positions of the purchasing agent and the accounts receivable agent. Which is an example of this?
Job rotation
A newly hired security specialist is asked to evaluate a company’s network security. The security specialist discovers that users have installed personal software; the network OS has default settings and no patches have been installed and passwords are not required to be changed regularly. Which of the following would be the FIRST step to take?
Enforce the security policy
As an experienced network administrator, you are responsible for infrastructure design and global configuration changes at Infotec. You are the only administrator who is assigned several tasks that are critical to continuity of operations after a risk assessment. You recommend that other administrators should also be trained to perform these tasks. Which of the following risks will be mitigated with the cross training?
Single point of failure
A system administrator reports that an unauthorized user has accessed the network. Which of the following would be the FIRST action to take?
Contain the problem
As an experienced technician, you are asked to secure a Infotec network. Refer to the following mechanisms. Which one will establish procedures to accomplish that?
Security policy
So as to facilitate communications in the office of a small call center business, an email system is going to be installed. As part of the upgrade, the vendor- offered to supply anti-malware software of $5,000 per year. However, if it is not adequately protected, there was a 90% chance each year that workstations would be compromised. Under that circumstance, it will take 30 staff three hours to restore services and the staff members in the call center are paid $90 per hour. What is the expected net savings if we purchase the anti-malware software?
$2290
Evidence can be used in court to convict persons of crimes. Which of the following phrase is the best description about the process for preserving the integrity of forensic evidence?
Chain of custody
Refer to the following descriptions. Which one is the most appropriate concerning risk analysis?
Evaluation and assessment
As an administrator, you happen to notice that the accounts of former temporary employee are still active on a domain. Refer to the following implementations, which one is applicable so as to increase security and prevent this from happening again?
Implement an account expiration date for temporary employees
The implicit deny will block anything you didn’t specifically allow but you may have allowed stuff that you don’t need. A technician is reviewing the system logs for a firewall and is told that there is an implicit deny within the ACL. Which is an example of an implicit deny?
Items which are not specifically given access are denied by default.
Refer to the following options. What is a common approach in forensic investigation?
Performing a binary copy of the systems storage media
An end-to-end traffic performance guarantee made by a service provider to a customer is a:
SLA
The staff must be cross-trained in different functional areas in order to detect fraud. Which of the following is an example of this?
Job rotation