Term
What type of monitoring compares network traffic, activities, transactions or behavior against a database of known attack patterns? |
|
Definition
|
|
Term
In what type of cloud computing does the customer have the highest level of control? |
|
Definition
cloud infrastructure as a service |
|
|
Term
The capability for devices to exchange low-level control messages is provided by which of the following protocols?
|
|
|
Definition
|
|
Term
When a network uses a single public IP address and each outgoing TCP packet uses a different port to allow for proper translation, which networking technology is being used?
|
|
|
Definition
|
|
Term
The standard TCP/IP protocol uses IP addresses which are how many bytes in length? |
|
Definition
|
|
Term
Which vendor neutral protocol implements support for VLAN tagging?
|
|
|
Definition
|
|
Term
Port-based authentication, in which users are authenticated on a per-switch port basis, is a function of which of the following standards?
|
|
Definition
|
|
Term
Which of the following network addresses is not a private IP address network?
- 10.4.5.0
- 172.63.255.0
|
|
|
Definition
|
|
Term
TCP/IP uses its own five-layer architecture that includes Network Interface, Internet, Control, Transport, and Application. (T/F) |
|
Definition
|
|
Term
The __________ is a high-speed storage network protocol that can transmit up to 16 gigabits per second.
|
|
|
Definition
|
|
Term
A network _____________ isolates connected devices by learning MAC addresses and only sending frames intended for specific MAC addresses to the ports they are connected to unless the MAC address is unknown. |
|
Definition
|
|
Term
Which of the following is not a component of an IP packet that a firewall rule can use for filtering purposes?
|
|
Definition
|
|
Term
When using SNMPv1 or SNMPv2, which piece of information is required to view information from an agent?
|
|
Definition
|
|
Term
Broadcast storms can be prevented by using loop prevention technology. Which of the following can be used to help prevent loops?
|
|
Definition
|
|
Term
Workgroup switches must work faster than core switches. (T/F) |
|
Definition
|
|
Term
A _____________ is a worker who works occasionally or regularly from a home office. |
|
Definition
|
|
Term
With operating system virtualization, a(n) _____________ system is the native operating system to the hardware.
|
|
|
Definition
|
|
Term
What are the values attributed to a system of beliefs that help the individual distinguish right from wrong?
|
|
Definition
|
|
Term
A written document that states how an organization plans to protect the company's information technology assets is a(n):
|
|
Definition
|
|
Term
The components required to identify, analyze and contain an incident are defined as:
|
|
Definition
|
|
Term
What type of plans include procedures to address redundancy and fault tolerance as well as data backups?
|
|
Definition
|
|
Term
The process of identifying exposure to threats, creating preventive and recovery procedures and then testing them to determine if they are sufficient is known as:
|
|
Definition
business continuity planning and testing
|
|
|
Term
Due to the potential impact of changes that can affect all users in an organization and considering that security vulnerabilities can arise from uncoordinated changes, what should an organization create to oversee changes?
|
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
Generally, _____________ focuses on restoring computing and technology resources to their former state.
|
|
|
Definition
|
|
Term
When a company needs to identify mission-critical business functions and quantify the impact a loss of such functions may have on the organization in terms of it's operational and financial position, which of the following should be performed?
|
|
Definition
|
|
Term
A written document that states how an organization plans to protect the company's information technology assets is a(n):
|
|
Definition
|
|
Term
How can an administrator keep devices powered when power is interrupted?
|
|
Definition
uninterruptible power supply |
|
|
Term
Which of the following is a type of cluster that is used to provide high-availability applications that require a high level of read and write actions, such as databases, messaging systems and file and print services?
|
|
Definition
|
|
Term
In which type of server cluster can services fail over from downed servers to functional servers?
|
|
Definition
|
|
Term
Which of the following options best describes a policy?
|
|
Definition
a document that outlines specific requirements or rules that must be met |
|
|
Term
When designing a security policy, many organizations follow a standard set of __________. |
|
Definition
|
|
Term
A service contract between a vendor and a client that specifies what services will be provided, the responsibilities of each party and any guarantees of service is known as:
service level agreement
recovery point objective
service point agreement
recovery time objective |
|
Definition
|
|
Term
Which of the following terms defines the study of what a group of people understand to be good and right behavior and how people make those judgments?
values
morals
ethics
standards
|
|
Definition
|
|
Term
Duplicate image backups are considered a primary key to uncovering evidence because they create exact replicas of the crime scene.
True
False |
|
Definition
|
|
Term
The first phase of the security policy cycle involves a vulnerability assessment.
True
False |
|
Definition
|
|
Term
Most people are taught using a(n) _____________ approach |
|
Definition
|
|
Term
A(n) ____________ is a methodical examination and review that produces a detailed report of its findings. |
|
Definition
|
|
Term
___________ seeks to approach changes systematically and provide the necessary documentation of the changes. |
|
Definition
|
|
Term
Which of the following terms describes the art of helping an adult learn?
andragogical
pedagogical
deontological
metagogical |
|
Definition
|
|
Term
A(n) _____________ is a collection of requirements specific to the system or procedure that must be met by everyone.
|
|
|
Definition
|
|