quiz image

Remote Facilities Device Identification Quiz

CuteModernism7612 avatar
CuteModernism7612
·
·
Download

Start Quiz

Study Flashcards

10 Questions

Which of the following would best enable a systems administrator to easily determine which devices are located at a remote facility and allow policy to be pushed to only those devices?

Standard naming conventions

A new company wants to avoid channel interference when building a WLAN. The company needs to know the radio frequency behavior, identify dead zones, and determine the best place for access points. Which of the following should be done first?

Conduct a site survey

Which of the following best describes a legal hold?

. It occurs during litigation and requires retention of both electronic and physical documents.

A recent malware outbreak across a subnet included successful rootkit installations on many PCs, ensuring persistence by rendering remediation efforts ineffective. Which of the following would best detect the presence of a rootkit in the future?

EDR

In a rush to meet an end-of-year business goal, the IT department was told to implement a new business application. The security engineer reviews the attributes of the application and decides the time needed to perform due diligence is insufficient from a cybersecurity perspective. Which of the following BEST describes the security engineer's response?

Risk acceptancE

A systems administrator is considering switching from tape backup to an alternative backup solution that would allow data to be readily available in the event of a disaster. Which of the following backup types should the administrator implement?

Cloud

A data administrator is configuring authentication for a SaaS application and would like to reduce the number of credentials employees need to maintain. The company prefers to use domain credentials to access new SaaS applications. Which of the following methods would allow this functionality?

SSO

Which of the following is a reason why a forensic specialist would create a plan to preserve data after an incident and prioritize the sequence for performing forensic analysis?

Order of volatility

A server administrator is reporting performance issues when accessing all internal resources. Upon further investigation, the security team notices the following: • A user's endpoint has been compromised and is broadcasting its MAC as the default gateway's MAC throughout the LAN.• Traffic to and from that endpoint is significantly greater than all other similar endpoints on the LAN.• Network ports on the LAN are not properly configured.• Wired traffic is not being encrypted properly. Which of the following attacks is most likely occurring?

ARP poisoning

An employee recently resigned from a company. The employee was responsible for managing and supporting weekly batch jobs over the past five years. A few weeks after the employee resigned, one of the batch jobs failed and caused a major disruption. Which of the following would work best to prevent this type of incident from reoccurring?

Job Rotation

Test your knowledge on tools that enable systems administrators to identify devices at remote facilities and push policies selectively. Choose the best option for determining devices at a distant location and applying policies to them.

Make Your Own Quizzes and Flashcards

Convert your notes into interactive study material.

Get started for free
Use Quizgecko on...
Browser
Browser