logo image

CSIS 2600 Chapter 12

You are troubleshooting a workstation connection to the network. During your troubleshooting, you replace the drop cable connecting the computer to the network. Which type of document should you update?
Change documentation
You are troubleshooting a workstation connection to the network. During your troubleshooting, you move the cable in the wiring closet to a different port on the patch panel. What type of document should you update?
Wiring schematic
You plan to implement a new security device on your network. Which of the following policies outlines the process you should follow before implementing that device?
Change management
Which type of documentation would you consult to find the location of RJ-45 wall jacks and their endpoints in the intermediate distribution closet?
Wiring schematic
You need to find out what kind of laws might apply to the design and operation of your network. Which type of document would you consult?
Regulation
In troubleshooting a router, you want to identify which other devices are connected to the router, as well as the subnet addresses of each connected subnet. Which type of document would most likely have this information?
Network diagram
Which of the following information are you likely to find in a policy document?
A requirement for using encrypted communications for web transactions.
Which of the following information are you likely to find in a procedure document?
Details on how to test and deploy patches
Which of the following documents would likely identify that drop cables on your network use the T568A standard?
Wiring schematic
You want to make sure that the correct ports on a firewall have been opened or closed. Which document should you check?
Configuration documentation
A new law was recently passed that states that all businesses must keep a history of all e-mails sent between members of the board of directors. You need to ensure that your organization complies with this law. Which document type would you update first in response to this new law?
Policy
You are concerned about the amount of traffic that passed through a router on your network. You want to see how the amount of traffic has changed over time. Which document would help in identifying past average network traffic?
Baseline
You are in the habit of regularly monitoring performance statistics for your devices. You find that this month a specific server has averaged a higher number of active connections than last month. Which type of document should you update to reflect the change?
Baseline
Which of the following terms describes a test lab environment that does not require the use of physical hardware?
Virtual sandbox
You manage a network with a single switch. All hosts connect to the network through the switch. You want to increase the security of devices that are part of the accounting department. You want to make sure that broadcast traffic sent by an accounting computer is only received by other accounting computers, and you want to implement ACLs to control traffic sent to accounting computers through the network.
Use a router to configure a subnet for the accounting computers
Which of the following fire extinguisher types is best used for electrical fires that might result when working with computer components?
Class C
Which of the following fire extinguisher suppressant types is best used for electrical fires that might result when working with computer components?
Carbon dioxide
Which of the following fire extinguisher types poses a safety risk to users in the area?
Halon and CO2
Which of the following statements about ESD is not correct?
ESD is much more likely to occur when the relative humidity is above 50%
What is the recommended humidity level for server rooms?
70%
You are adding a new rack to your data center, which will house two new blade servers and a new switch. The new servers will be used for virtualization.
Hire an electrician to install a wall outlet near the new rack
The power supply in a tower server system has malfunctioned. To get the server back on line, you decide to open the server case and open int. You place the server on a static mat, ground the server’s case to the mat, and then ground yourself to the mat with a wristband.
You should never open a computer power supply, and you should unplug a device form the wall outlet before connecting yourself
You have just started a new job as a network team leader for a small company. You are responsible for overseeing the work of help desk technicians, as well as doing your own share of the administrative work.
Download them from the chemical manufacturers’ websites.
Which of the following is an example of an internal threat?
A user accidentally deletes the new product designs.
Which of the following is an example of privilege escalation?
Creeping privileges
What is the greatest threat to the confidentiality of data in most secure organizations?
USB devices
When would choosing to do nothing about an identified risk be acceptable?
When the cost of protecting the asset is greater than the potential loss
When analyzing assets, which analysis method assigns financial values to assets?
Quantitative
You company has developed and implemented countermeasures for the greatest risks to their assets. However, there is still some risk left.
Residual risk
Which of the following is not a valid response to a risk discovered during a risk analysis?
Denial
If an organization shows sufficient due care, which burden is eliminated in the event of a security breach?
Negligence
Purchasing insurance is what type of response to risk?
Transference
When recovery is being performed due to a disaster, which services are to be stabilized first?
Mission critical
In business continuity planning, what is the primary focus of the scope?
Business processes
What is the primary goal of business continuity planning?
Maintaining business operations with reduced or restricted infrastructure capabilities
Which of the following network strategies connects multiples servers together such that if one server fails, the others immediately take over its tasks
Clustering
You manage the website for your company. The web1 server hosts the website. This server has the following configuration:
disk controller
You manage a website for your company. The website uses three servers configured in a cluster.
Website storage
Your organization is in the process of negotiating an Interoperability Agreement (IA) with another organization. As part of this agreement, the partner organization proposes that a federated trust be established between your domain and their domain.
Identify how data will be shared and identify how data ownership will be determined
What is the most common failure of a security policy in an environment?
Lack of user awareness
which business document is a contract that defines a set of terms that will govern future agreements between parties?
Master service agreement
A user named bob smith has been assignment a new desktop workstation to complete his day-to-day work. The computer runs Windows 7.
Train users not to use passwords that are easy to guess and require users to set a stronger password upon initial logon.
You have installed anti-virus software on computers at your business. Within a few days, however, you notice that one computer has a virus.
user awareness training
What is the main difference between vulnerability scanning and penetration testing?
Vulnerability scanning is performed within the security perimeter, penetration testing is performed outside of the security perimeter.
What is the primary purpose of penetration testing?
Test the effectiveness
A security administrator logs on to a windows server on her organization’s network. She then runs a vulnerability scan on that server.
Credentialed scan
A network utilizes a NETWORK Access Control (nac) solution to protect against malware.
Posture assessment
You plan to implement an new security device on your network. Which of the following policies outlines the process you should follow before implementing that device?
Change management
Which component of a change and configuration management policy identifies technical and budgetary considerations associated with a proposed change and also identifies
Feasibility analysis
Which of the following is an example of privilege escalation?
Creeping privileges

Need essay sample on "CSIS 2600 Chapter 12"? We will write a custom essay sample specifically for you for only $ 13.90/page

Can’t wait to take that assignment burden offyour shoulders?

Let us know what it is and we will show you how it can be done!
×
Sorry, but copying text is forbidden on this website. If you need this or any other sample, please register

Already on Businessays? Login here

No, thanks. I prefer suffering on my own
Sorry, but copying text is forbidden on this website. If you need this or any other sample register now and get a free access to all papers, carefully proofread and edited by our experts.
Sign in / Sign up
No, thanks. I prefer suffering on my own
Not quite the topic you need?
We would be happy to write it
Join and witness the magic
Service Open At All Times
|
Complete Buyer Protection
|
Plagiarism-Free Writing

Emily from Businessays

Hi there, would you like to get such a paper? How about receiving a customized one? Check it out https://goo.gl/chNgQy

We use cookies to give you the best experience possible. By continuing we’ll assume you’re on board with our cookie policy