Remote Facilities Device Identification Quiz
10 Questions
1 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which of the following would best enable a systems administrator to easily determine which devices are located at a remote facility and allow policy to be pushed to only those devices?

  • Baseline configurations
  • Hot sites
  • Network diagrams
  • Standard naming conventions (correct)
  • A new company wants to avoid channel interference when building a WLAN. The company needs to know the radio frequency behavior, identify dead zones, and determine the best place for access points. Which of the following should be done first?

  • Job rotation
  • . Server-side validation
  • Conduct a site survey (correct)
  • Account audits
  • Which of the following best describes a legal hold?

  • Building a baseline
  • . It occurs during litigation and requires retention of both electronic and physical documents. (correct)
  • Included third-party libraries / Vendors/supply chain
  • APT groups
  • A recent malware outbreak across a subnet included successful rootkit installations on many PCs, ensuring persistence by rendering remediation efforts ineffective. Which of the following would best detect the presence of a rootkit in the future?

    <p>EDR</p> Signup and view all the answers

    In a rush to meet an end-of-year business goal, the IT department was told to implement a new business application. The security engineer reviews the attributes of the application and decides the time needed to perform due diligence is insufficient from a cybersecurity perspective. Which of the following BEST describes the security engineer's response?

    <p>Risk acceptancE</p> Signup and view all the answers

    A systems administrator is considering switching from tape backup to an alternative backup solution that would allow data to be readily available in the event of a disaster. Which of the following backup types should the administrator implement?

    <p>Cloud</p> Signup and view all the answers

    A data administrator is configuring authentication for a SaaS application and would like to reduce the number of credentials employees need to maintain. The company prefers to use domain credentials to access new SaaS applications. Which of the following methods would allow this functionality?

    <p>SSO</p> Signup and view all the answers

    Which of the following is a reason why a forensic specialist would create a plan to preserve data after an incident and prioritize the sequence for performing forensic analysis?

    <p>Order of volatility</p> Signup and view all the answers

    A server administrator is reporting performance issues when accessing all internal resources. Upon further investigation, the security team notices the following: • A user's endpoint has been compromised and is broadcasting its MAC as the default gateway's MAC throughout the LAN.• Traffic to and from that endpoint is significantly greater than all other similar endpoints on the LAN.• Network ports on the LAN are not properly configured.• Wired traffic is not being encrypted properly. Which of the following attacks is most likely occurring?

    <p>ARP poisoning</p> Signup and view all the answers

    An employee recently resigned from a company. The employee was responsible for managing and supporting weekly batch jobs over the past five years. A few weeks after the employee resigned, one of the batch jobs failed and caused a major disruption. Which of the following would work best to prevent this type of incident from reoccurring?

    <p>Job Rotation</p> Signup and view all the answers

    Study Notes

    Determining Device Locations

    • A systems administrator can use a device's location to determine which devices are at a remote facility and push policy to only those devices.

    WLAN Planning

    • To avoid channel interference when building a WLAN, it's essential to know the radio frequency behavior and identify dead zones to determine the best place for access points.
    • A legal hold is a process that preserves and protects all relevant data and evidence in anticipation of a legal investigation or litigation.

    Detecting Rootkits

    • To detect the presence of a rootkit, it's best to use a rootkit detection tool or a Host-Based Intrusion Detection System (HIDS) that can identify hidden files, processes, and registry entries.

    Cybersecurity Due Diligence

    • A security engineer should prioritize cybersecurity concerns and perform due diligence when implementing a new business application to ensure it meets security standards.

    Alternative Backup Solutions

    • A systems administrator considering switching from tape backup should implement a cloud backup or disk-based backup solution to allow for readily available data in the event of a disaster.

    Authentication and SaaS Applications

    • To reduce the number of credentials employees need to maintain, a data administrator can implement Single Sign-On (SSO) using domain credentials to access new SaaS applications.

    Forensic Analysis

    • A forensic specialist creates a plan to preserve data after an incident and prioritizes the sequence for performing forensic analysis to ensure that critical data is not compromised or lost.

    Network Security Issues

    • A security team may encounter a rogue DHCP server attack, where a compromised endpoint broadcasts its MAC as the default gateway's MAC, causing performance issues and unauthorized network access.

    Batch Job Management

    • To prevent disruptions caused by failed batch jobs, it's essential to have a knowledge transfer process in place, where critical job information and responsibilities are documented and shared among team members.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Description

    Test your knowledge on tools that enable systems administrators to identify devices at remote facilities and push policies selectively. Choose the best option for determining devices at a distant location and applying policies to them.

    More Like This

    Use Quizgecko on...
    Browser
    Browser