Exam Prep Graded A+
______ is used to ensure that configuration management activities are effective and
enforced.
A. Inventory
B. Baseline
C. Identification
D. Verification and audit - ANSWER-D. Verification and audit
"Wiring _____" is a common term meaning "a place where wires/conduits are often run,
and equipment can be placed, in order to facilitate the use of local networks."
A. Shelf
B. Closet
C. Bracket
D. House - ANSWER-B. Closet
(ISC)² publishes a Common Body of Knowledge (CBK) that IT security practitioners
should be familiar with; this is recognized throughout the industry as a set of material
that is useful for practitioners to refer to. Certifications can be issued for demonstrating
expertise in this Common Body of Knowledge. What kind of document is the Common
Body of Knowledge?
A. Policy
B. Procedure
C. Standard
D. Law - ANSWER-C. Standard
A _____ is a record of something that has occurred.
A. Biometric
B. Law
C. Log
D. Firewall - ANSWER-C. Log
A bollard is a post set securely in the ground in order to prevent a vehicle from entering
an area or driving past a certain point. Bollards are an example of ______ controls.
A. Physical
B. Administrative
C. Drastic
D. Technical - ANSWER-A. Physical
A device that filters network traffic in order to enhance overall security/performance.
A. Endpoint
B. Laptop
C. MAC (media access control)
,D. Firewall - ANSWER-D. Firewall
A device that is commonly useful to have on the perimeter between two networks.
A. User laptop
B. IoT
C. Camera
D. Firewall - ANSWER-D. Firewall
A device typically accessed by multiple users, often intended for a single purpose, such
as managing email or web pages.
A. Router
B. Switch
C. Server
D. Laptop - ANSWER-C. Server
A human guard monitoring a hidden camera could be considered a ______ control.
A. Detective
B. Preventive
C. Deterrent
D. Logical - ANSWER-A. Detective
A means to allow remote users to have secure access to the internal IT environment.
A. Internet
B. VLAN
C. MAC
D. VPN - ANSWER-D. VPN
A software firewall is an application that runs on a device and prevents specific types of
traffic from entering that device. This is a type of ________ control.
A. Physical
B. Administrative
C. Passive
D. Technical - ANSWER-D. Technical
A system that collects transactional information and stores it in a record in order to show
which users performed which actions is an example of providing ________.
A. Non-repudiation
B. Multifactor authentication
C. Biometrics
D. Privacy - ANSWER-A. Non-repudiation
A tool that aggregates log data from multiple sources, and typically analyzes it and
reports potential threats.
A. HIDS
B. Anti-malware
C. Router
, D. SIEM - ANSWER-D. SIEM
A tool that filters inbound traffic to reduce potential threats.
A. NIDS (network-based intrusions-detection systems)
B. Anti-malware
C. DLP (data loss prevention)
D. Firewall - ANSWER-D. Firewall
A tool that inspects outbound traffic to reduce potential threats.
A. NIDS (network-based intrusion-detection systems)
B. Anti-malware
C. DLP (data loss prevention)
D. Firewall - ANSWER-C. DLP (data loss provention)
A tool that monitors local devices to reduce potential threats from hostile software.
A. NIDS (network-based intrusion-detection systems
B. Anti-malware
C. DLP (data loss prevention)
D. Firewall - ANSWER-B. Anti-malware
A vendor sells a particular operating system (OS). In order to deploy the OS securely on
different platforms, the vendor publishes several sets of instructions on how to install it,
depending on which platform the customer is using. This is an example of ______.
A. Law
B. Procedure
C. Standard
D. Policy - ANSWER-B. Procedure
A VLAN is a _____ method of segmenting networks.
A. Secret
B. Physical
C. Regulated
D. Logical - ANSWER-D. Logical
All of the following are important ways to practice an organization disaster recovery
(DR) effort; which one is the most important?
A. Practice restoring data from backups
B. Facility evacuation drills
C. Desktop/tabletop testing of the plan
D. Running the alternate operating site to determine if it could handle critical function in
time of emergency - ANSWER-B. Facility evacuation drills
All of the following are typically perceived as drawbacks to biometric systems, except:
A. Lack of accuracy
B. Potential privacy concerns
C. Retention of physiological data past the point of employment