Regulatory framework compliance will require organizations to comply with security regulations -
Answers True
Regulatory framework compliance is comprised of procedures, practices, guidelines, standards and
policy - Answers True
An Enterprise consists of hardware and software infrastructure, organizations, policy, operations,
internal and external networks, internal devices, production environments and is structured on business
architecture, information architecture, data architecture, applications architecture and employees -
Answers True
Disaster recovery for an enterprise enterprise is for scalability measures - Answers False
RAID stands for - Answers Redundant Array of Independent Disks
The CIA is an initialization for - Answers C- Confidentiality I- Integrity A- Availability
FQDN represents ? - Answers Fully Qualified Domain Name and it represents the domain name of a
network
System backups are not necessary in an enterprise environment - Answers False
Job tasks for a system admin includes - Answers 1. Monthly patching of the system
2. Designing the system architecture
3. Capacity planning and system lifecycle management
Three main components of a network in an Enterprise are - Answers Hardware
Software
Protocols
A proxy server (load balancer) could be used to allow for high availability of web servers - Answers True
Powershell is monitoring software on the Linux platform used for authentication - Answers False
What is the reasoning behind the notion of swap space - Answers To allow an extension of RAM on a
computing platform
What is the use of a GPO? - Answers Group Policy Object is used to set Windows group policy in
Enterprise computing
What is used to authenticate users in an Enterprise environment? - Answers An Active Directory
, An organizational unit (OU) is a container that holds groups of users and computers in an Enterprise -
Answers True
The NIST SP800- 128 is about the minimum security requirements for Federal Information Systems.
(Cyber Security Requirements) - Answers False
How does communication work in a client server architecture ? - Answers A server listens on a specific
port and listens for incoming requests from clients
What is a protocol ? - Answers A common language between entities (eg. HTTPS)
There is a maximum of a 10,000 ports available for protocols on a system NIC - Answers False
What are the 3 critical identifiers for the TCP network communications - Answers IP address
MAC address
Ports
System and Information Security implies that - Answers We identify, report, and correct information and
information system flaws in a timely manner, provide protection from malicious code at appropriate
locations within the organizational information systems and monitor information system security alerts
and advisories and take appropriate actions in response
What is the function of System and Communications Protection (SC) - Answers To monitor, control and
protect organization communications
What is Risk Assessment - Answers assessing risks to organization operations, assets and individuals.
Personnell Security (PS) - Answers Make sure individuals with responsibility are trust worthy
Maintenance - Answers must establish timely maintenance on systems such as patching
Incident Response (IR) - Answers incident handling with preparation, detection analysis, containment
and recovery
Configuration Management - Answers baseline configuration, inventory, and performing maintenance
on systems.
Access Control (AC) - Answers The management of authorized users access to the information systems
NIST SP800- 53 - Answers This document covers the security control structure for information systems
Awareness and Training - Answers Security training of employees meets this criteria for federal systems
Audit and Accountability - Answers the auditing of systems require monitoring to detect unlawful access
SSH - Answers An encrypted protocol used in communications on the network