Скачать книгу

terms on-boarding and off-boarding are typically associated with which of the following policies?Data loss preventionIncident responseInventory managementIdentity managementDisaster recoveryBusiness continuity

      82 The term off-boarding refers to which of the following procedures?Removing a node from a clusterDisconnecting all cables from a switchRevoking a user's network privilegesRetiring old workstations

      83 Which of the following is most likely to be the last step in a change management procedure?DocumentationNotificationApprovalScheduling

      84 Which of the following U.S. organizations are capable of imposing international export controls on software products? (Choose all that apply.)The company that created the softwareDepartment of StateDepartment of CommerceDepartment of the Treasury

      85 Which of the following is the primary result of an organization's security incident response policies?To know how to respond to a particular incidentTo prevent an incident from occurring againTo identify the cause of an incidentTo document the procedures leading up to an incident

      86 You are an IT director, and a fire has broken out in the lower floors of your company's office building. After the personnel are evacuated, the fire department asks you where they can find documentation about all chemicals and equipment used in the company's datacenter, which is threatened by the fire. You direct them to the correct filing cabinet in your office, which contains which of the following document types?ESDNDABYODMSDS

      87 You have been asked to draft an Acceptable Use Policy (AUP) for new hires at your company to sign, which specifies what they can and cannot do when working with the company's computers and network. Which of the following is not one of the provisions typically found in this type of document?PrivacyOwnershipIllegal useUpgrades

      88 You are starting a new job, and the company's Human Resources (HR) department has asked you to sign an Acceptable Use Policy (AUP) regarding computer and network use. The document includes a privacy clause. Which of the following are specifications you can expect to find in this clause? (Choose all that apply.)Any emails you send or receive can be monitored by the company at any time.All files and data that you store on company computers must be accessible to the company for scanning and monitoring.All work that you perform for the company becomes the sole property of the company, including copyrights and patents.All hardware, software, and any proprietary data stored on the company's computers remains the property of the company.

      89 Which of the following tasks is not considered to be part of an IT department's incident response plan?Stopping an ongoing incidentContaining the damage caused by an incidentRepairing the damage caused by an incidentRebuilding an infrastructure destroyed by an incident

      90 Which of the following are occurrences that are typically addressed by an IT department's incident response policies? (Choose all that apply.)Denial-of-Service (DoS) attackHard disk failureElectrical fireServer outage

      91 Which of the following terms would apply to the procedure of adding a user's personal smartphone to the network under a Bring Your Own Device (BYOD) policy?Out-of-bandOn-boardingIn-bandOff-boarding

      92 Your company has been acquired by another firm and, as IT director, you will have to comply with the new firm's safety policies in your datacenter and other IT workspaces. One of the new requirements states that there must be a fail closed policy for the datacenter. Which of the following best describes what this policy dictates should occur in the event of an emergency?All computers that are logged on should automatically log off.All computers that are running should automatically shut down.All doors that are normally open should lock themselves.All doors that are normally locked should open themselves.

      93 You are the first responder to an incident of computer crime at your company. The datacenter's security has been penetrated, a server accessed, and sensitive company data stolen. The company's incident response plan lists the specific tasks that you are responsible for performing. Which of the following are likely to be among those tasks? (Choose all that apply.)Turn off the server.Secure the area.Document the scene.Collect evidence.Cooperate with the authorities.

      94 Password policies frequently require users to specify complex passwords. Which of the following are characteristic of a complex password?Passwords that contain mixed upper- and lowercase letters, numbers, and symbolsPasswords that exceed a specific lengthPasswords that do not duplicate a specific number of the user's previous passwordsPasswords that do not duplicate the user's account name, birth date, or other personal information

      95 Password policies that contain a history requirement typically have which of the following limitations?Users cannot reuse recent passwords.Users cannot create passwords containing names of relatives.Users cannot create passwords containing names of historical figures.Users cannot create passwords that duplicate those of any other users on the network.

      96 Account lockout policies are designed to protect against which of the following types of attacks?Social engineeringSpoofingBrute forceMan in the middle

      97 Which of the following types of password policies are designed to prevent brute-force attacks? (Choose all that apply.)Password length policiesAccount lockout policiesPassword history policiesComplex password policies

      98 Which of the following is not likely to be a procedural element of an IT asset disposal policy?Data deletionRecyclingData preservationInventory

      99 While negotiating a new contract with a service provider, you have reached a disagreement over the contracted reliability of the service. The provider is willing to guarantee that the service will be available 99 percent of the time, but you have been told to require 99.9 percent. When you finally reach an agreement, the negotiated language will be included in which of the following documents?SLAAUPNDABYOD

      100 Which of the following elements would you typically not expect to find in a Service Level Agreement (SLA) between an Internet Service Provider (ISP) and a subscriber?A definition of the services to be provided by the ISPA list of specifications for the equipment to be provided by the ISPThe types and schedule for the technical support to be provided by the ISPThe types of applications that the subscriber will use when accessing the ISP's services

      101 You have just completed negotiating an annual contract with a provider to furnish your company with cloud services. As part of the contract, the provider has agreed to guarantee that the services will be available 99.9 percent of the time, around the clock, seven days per week. If the services are unavailable more than 0.1 percent of the time, your company is due a price adjustment. Which of the following terms describes this clause of the contract?SLAMTBFAUPMTTR

      102 The technical support clause of a Service Level Agreement (SLA) will typically include which of the following elements? (Choose all that apply.)Whether the provider will provide on-site, telephone, or online supportThe time service for responses to support calls, which specifies how quickly the provider must respond to requests for support.The percentage of time that the service is guaranteed to be availableThe amount of support that will be provided and the costs for additional support

      103 After switching from a standard public switched telephone network (PSTN) telephone system to a Voice over Internet Protocol (VoIP) system, users are complaining of service interruptions and problems hearing callers at certain times of the day. After examining a network traffic audit and assessment report, you determine that traffic levels on the Internet connection are substantially higher during the first and last hours of the day, the same times when most of the users experienced problems. Which of the following solutions can provide more reliable VoIP service during peak usage times?Implement traffic shapingImplement load balancingUpgrade the Local Area Network (LAN) from Fast Ethernet to Gigabit EthernetReplace the router connecting the LAN to the Internet with a model that supports Simple Network Management Protocol (SNMP).

      104 A server with dual power supplies must be running in which of the following modes for the system to be fault tolerant?Combined modeRedundant modeIndividual modeHot backup mode

      105 Redundant power circuits can enable a server to continue running in spite of which of the following events?A citywide power outageA server power supply failureAn uncorrected building circuit failureA failure of the server's Uninterruptable Power Supply (UPS)

      106 Which of the following media types is Windows Server Backup unable to use to

Скачать книгу