Complete Correct Answers (A+ Pass)
What is referred to as configuration drift? - Answers -✔✔ The deviation of a CI from its
baseline
Which of the following is the BEST approach when a configuration has drifted from its
baseline? - Answers -✔✔ Perform testing to determine whether to revert.
Which backup mode creates a snapshot-type image of the whole system? - Answers -
✔✔ State/bare metal
What role does a Change Advisory Board (CAB) play in change management? -
Answers -✔✔ It approves major or significant changes.
Why should configuration changes only be made with a service request ticket? -
Answers -✔✔ To ensure that the activity of network personnel is recorded
Why is it important to track software license usage in an asset inventory? - Answers -
✔✔ To ensure compliance with the vendor's licensing agreement
What is a configuration backup used for when applying an update? - Answers -✔✔ To
serve as a fallback
Why is it important to stay up to date with system security advisories - Answers -✔✔ To
stay informed about vulnerabilities
What is the standard method of sanitizing an HDD? - Answers -✔✔ Overwriting
What does the Secure Erase (SE) command do on HDDs? - Answers -✔✔ Performs a
single pass of zero-filling
What is the primary purpose of using physical network diagrams? - Answers -✔✔ To
capture the complex relationships between network elements
What is the purpose of a rack diagram? - Answers -✔✔ To record the position of each
appliance in the rack
Which layer's diagram would show asset IDs, cable links, and wall/patch panel/switch
port IDs? - Answers -✔✔ PHY (Physical layer)
, What historical method might IT departments have used for tracking IP usage? -
Answers -✔✔ Static files
Which agreement is most likely to be used between two companies to protect shared
sensitive information? - Answers -✔✔ Non-Disclosure Agreement (NDA)
What is a basic type of IP scanning mentioned in the document? - Answers -✔✔ Host
discovery
What does an IP scanner do? - Answers -✔✔ Establishes the logical topology of the
network
Which type of scanners use specially crafted probes to locate hosts that might be
configured not to respond to pings? - Answers -✔✔ Security-oriented scanners
What does Nmap use to determine whether a host is present when used without
switches? - Answers -✔✔ It pings and sends a TCP ACK packet to ports 80 and 443.
Which feature allows Nmap to work out hop counts? - Answers -✔✔ --traceroute switch
Which Nmap scan type is less stealthy due to its use of the operating system to attempt
a full TCP connection? - Answers -✔✔ TCP connect (-sT)
What is the purpose of using the -sV or -A switch with Nmap? - Answers -✔✔ To limit
the scan to the local network only
What is the primary function of Cisco Discovery Protocol (CDP)? - Answers -✔✔ To
discover information about directly connected Cisco devices
Which of the following is NOT information that CDP can report? - Answers -✔✔ MAC
address table sizes
What can cause a broadcast storm in a network? - Answers -✔✔ Switching loops
What metric measures the actual amount of data transferred over a network? - Answers
-✔✔ Throughput
What does an availability monitor check for in an HTTP service to confirm availability? -
Answers -✔✔ A 200 status code
What is the primary function of an availability monitor? - Answers -✔✔ To trigger an
alarm for service unscheduled downtime