GUIDE//UPDATED QUESTIONS AND 100% VERIFIED ANSWERS
COMPLETE ALREADY RATED A+.
EXAM QUESTIONS VERIFIED ANSWERS A+ GRADED
1. _______ are acts that are hostile to an
Intentional threats
organization.
2. ________ help(s) prevent a hard drive from
being a single point of failure. __________
help(s) prevent a server from being a single RAID, Failover clusters, Cross-training
point of failure. _________ help(s) prevent a
person from being a single point of failure.
3. _________ is the process of creating a list of
Threat identification
threats.
4. __________ damage for the sake of doing
damage, and they often choose targets of Vandals
opportunity.
,5. ____________ assessments are objective,
while ___________ assessments are Quantitative, qualitative
subjective.
6. _____________ is the likelihood that a threat
Probability
will exploit a vulnerability.
7. A __________ is a computer joined to a
zombie
botnet.
8. A ___________ plan can help ensure that
mission-critical systems continue to function business continuity
after a disaster.
9. A ___________ plan can help you identify
disaster recovery
steps needed to restore a failed system.
10. A _____________ policy governs how
patches are understood, tested, and rolled out patch management
to systems and clients.
11. A business impact analysis (BIA) is an
business continuity plan, disaster
important part of a _____________, and it
recovery plan
can also be part of a __________.
12. A new company does not have a lot of
revenue for the first year. Installing antivirus Workstation Domain
software for all the company's computers
, would be very costly, so the owners decide
to forgo purchasing antivirus software for the
first year of the business. In what domain of
a typical IT infrastructure is a vulnerability
created?
13. A technician in a large corporation fixes a
printer that was not receiving an IP address
automatically by manually assigning it an
address. The address was assigned to a
Through change management
server that was offline and being upgraded.
When the server was brought online, it was
no longer accessible. How could this
problem have been avoided?
a compromise between a hot site and a
14. A warm site is:
cold site.
15. A_____ is a computer joined to a botnet zombie
16. A______policy governs how patches are
understood ,tested ,and rolled out to systems patch management
and clients.
, 17. A(n) _________ is the likelihood that
risk
something unexpected is going to occur.
18. A(n) _________ provides secure access to a
private network over a public network such virtual private network (VPN)
as the Internet.
19. A(n) _____________ is a process used to
cost-benefit analysis (CBA)
determine how to manage risk.
20. A(n) ___________________ is performed to
risk assessment
identify and evaluate risks.
21. According to the World Intellectual Property
Organization (WIPO), the two categories of
industrial property, copyright
intellectual property (IP) are
_______________ and _______________.
22. Aditya is assessing the value of IT systems.
His company sells sporting goods online.
One factor of his evaluation is the required
availability of each system. Some systems
E-commerce website server
must be available 24/7, while others must be
available during regular business hours
Monday through Friday. Which of the
following would have the highest availability