COMPUTER NETWORKS EXAM 3
QUESTIONS AND ANSWERS
Examples of different types of pen testing - Answer-black box/ unknown environment,
white box/ known environment, and gray box/ partially known environment
Cold backup site - Answer-it can be up and running in a short period of time, such as a
day or two. provides the physical location and basic service
Hot backup site - Answer-set up to be ready to go at any moment, within a few hours it
can become a fully functioning element of an organization
Warm backup site - Answer-typically has computers but its not configured ready to go,
the time it takes to operate lands in between the cold and hot sites
What is social engineering - Answer-it is a hacker term for tricking people into revealing
their password or other security information. its an attack that attempts to take
advantage of human behavior
What is fault tolerance - Answer-the capability to withstand a failure without losing data
What is phishing - Answer-it involves getting offers of products, services or opportunities
through emails, phone calls, and text messages. it is designed to trick individuals into
giving out personal information such as credit card numbers and account numbers
what is clustering - Answer-a method of balancing loads and providing fault tolerance
The physical documentation of a network should include the following elements: -
Answer-cabling information, servers, network devices, wide-area network, and user
information
examples of different policies found within the organization - Answer-password policies,
bring your own device (BYOD), acceptable use policy (AUP), user account policy,
disaster recovery plan, business continuity plan (BCP), nondisclosure agreements
(NDAs), service level agreements (SLAs), memorandum of understanding (MOU),
safety procedure and policies
which documentation is the most important - Answer-configuration documentation
What does CIA stand for - Answer-Confidentiality, Integrity, and Availability
access control standards - Answer-describes the mechanisms used to filter network
traffic to determine who is and who is not allowed to access the network and network
resources
QUESTIONS AND ANSWERS
Examples of different types of pen testing - Answer-black box/ unknown environment,
white box/ known environment, and gray box/ partially known environment
Cold backup site - Answer-it can be up and running in a short period of time, such as a
day or two. provides the physical location and basic service
Hot backup site - Answer-set up to be ready to go at any moment, within a few hours it
can become a fully functioning element of an organization
Warm backup site - Answer-typically has computers but its not configured ready to go,
the time it takes to operate lands in between the cold and hot sites
What is social engineering - Answer-it is a hacker term for tricking people into revealing
their password or other security information. its an attack that attempts to take
advantage of human behavior
What is fault tolerance - Answer-the capability to withstand a failure without losing data
What is phishing - Answer-it involves getting offers of products, services or opportunities
through emails, phone calls, and text messages. it is designed to trick individuals into
giving out personal information such as credit card numbers and account numbers
what is clustering - Answer-a method of balancing loads and providing fault tolerance
The physical documentation of a network should include the following elements: -
Answer-cabling information, servers, network devices, wide-area network, and user
information
examples of different policies found within the organization - Answer-password policies,
bring your own device (BYOD), acceptable use policy (AUP), user account policy,
disaster recovery plan, business continuity plan (BCP), nondisclosure agreements
(NDAs), service level agreements (SLAs), memorandum of understanding (MOU),
safety procedure and policies
which documentation is the most important - Answer-configuration documentation
What does CIA stand for - Answer-Confidentiality, Integrity, and Availability
access control standards - Answer-describes the mechanisms used to filter network
traffic to determine who is and who is not allowed to access the network and network
resources