Maintaining the hypervisor - Answers Bert is considering the use of an infrastructure as a
service cloud computing partner to provide virtual servers.
Which one of the following would be a vendor responsibility in this scenario?
Maintaining the hypervisor
Managing operating system security settings
Maintaining the host firewall
Configuring server access control
Somewhere you are - Answers Callback to a landline phone number is an example of what type
of factor?
Something you know
Somewhere you are
Something you have
Something you are
Likelihood - Answers Renee is using encryption to safeguard sensitive business secrets when in
transit over the Internet.
What risk metric is she attempting to lower?
Likelihood
RTO
MTO
Impact
Worm - Answers Kim is the system administrator for a small business network that is
experiencing security problems.
She is in the office in the evening working on the problem, and nobody else is there.
, As she is watching, she can see that systems on the other side of the office that were
previously behaving normally are now exhibiting signs of infection.
What type of malware is Kim likely dealing with?
Virus
Worm
Trojan horse
Logic bomb
A bus and a ring - Answers What two logical network topologies can be physically implemented
as a star topology?
A bus and a mesh
A ring and a mesh
A bus and a ring
It is not possible to implement other topologies as a star.
Account review - Answers Jim has worked in human relations, payroll, and customer service
roles in his company over the past few years. What type of process should his company
perform to ensure that he has appropriate rights?
Re-provisioning
Account review
Privilege creep
Account revocation
ICMP echo request - Answers What type of inbound packet is characteristic of a ping flood
attack?
ICMP echo request