6 Flashcards
Naomi wants to deploy a tool that can allow her to scale horizontally while also allowing her to patch systems without interfering with traffic to her web servers. What type of technology should she deploy?
A. A load balancer
B. NIC teaming
C. Geographic diversity
D. A multipath network
A. A load balancer
Rick performs a backup that captures the changes since the last full backup. What type of backup has he performed?
A. A new full backup
B. A snapshot
C. An incremental backup
D. A differential backup
D. A differential backup
What type of recovery site has some or most systems in place but does not have the data needed to take over operations?
A. A hot site
B. A warm site
C. A cloud site
D. A cold site
B. A warm site
Ben wants to implement a RAID array that combines both read and write performance while retaining data integrity if a drive fails. Cost is not a concern compared to speed and resilience. What RAID type should he use?
A. RAID 1
B. RAID 5
C. RAID 6
D. RAID 10
D. RAID 10
Cynthia wants to clone a virtual machine. What should she do to capture a live machine, including the machine state?
A. A full backup
B. A snapshot
C. A differential backup
D. A LiveCD
B. A snapshot
Sally is working to restore her organization’s operations after a disaster took her datacenter offline. What critical document should she refer to as she restarts systems?
A. The restoration order documentation
B. The TOTP documentation
C. The HOTP documentation
D. The last-known good configuration documentation
A. The restoration order documentation
Mike wants to stop vehicles from traveling toward the entrance of his building. What physical security control should he implement?
A. An air gap
B. A hot aisle
C. A robotic sentry
D. A bollard
D. A bollard
Amanda wants to securely destroy data held on DVDs. Which of the following options is not a suitable solution for this?
A. Degaussing
B. Burning
C. Pulverizing
D. Shredding
A. Degaussing
Why are Faraday cages deployed?
A. To prevent tailgating
B. To assist with fire suppression
C. To prevent EMI
D. To prevent degaussing
C. To prevent EMI
Which of the following controls helps prevent insider threats?
A. Two-person control
B. Visitor logs
C. Air gaps
D. Reception desks and staff
A. Two-person control
Madhuri wants to implement a camera system but is concerned about the amount of storage space that the video recordings will require. What technology can help with this?
A. Infrared cameras
B. Facial recognition
C. Motion detection
D. PTZ
C. Motion detection
What factor is a major reason organizations do not use security guards?
A. Reliability
B. Training
C. Cost
D. Social engineering
C. Cost
Michelle wants to ensure that attackers who breach her network security perimeter cannot gain control of the systems that run the industrial processes her organization uses as part of their business. What type of solution is best suited to this?
A. An air gap
B. A Faraday cage
C. A cold aisle
D. A screened subnet
A. An air gap
Kathleen wants to discourage potential attackers from entering the facility she is responsible for. Which of the following is not a common control used for this type of preventive defense?
A. Fences
B. Lighting
C. Robotic sentries
D. Signs
C. Robotic sentries
How does technology diversity help ensure cybersecurity resilience?
A. It ensures that a vulnerability in a single company’s product will not impact the entire infrastructure.
B. If a single vendor goes out of business, the company does not need to replace its entire infrastructure.
C. It means that a misconfiguration will not impact the company’s entire infrastructure.
D. All of the above.
D. All of the above.
Scott send his backups to a company that keeps them in a secure vault. What type of backup solution has he implemented?
A. Nearline
B. Safe
C. Online
D. Offline
D. Offline
Gabby wants to implement a mirrored drive solution. What RAID level does this describe?
A. RAID 0
B. RAID 1
C. RAID 5
D. RAID 6
B. RAID 1
Florian wants to ensure that systems on a protected network cannot be attacked via the organization’s network. What design technique should he use to ensure this?
A. A hot aisle
B. An air gap
C. A cold aisle
D. Protected cable distribution
B. An air gap
What type of physical security control is shown here?
An illustration shows a rectangle with 2 doors, one on the left side, labeled Door 1, and the other on the right side, labeled Door 2. A Secure Area is represented by a dashed rectangle adjacent to the first rectangle on the right side. A downward curving arrow points from Door 1 to the area inside the first rectangle. Another downward curving arrow points from Door 2 to the Secure Area.
A. A Faraday cage
B. A mantrap
C. A bollard
D. An air gap
B. A mantrap
Gurvinder identifies a third-party datacenter provider over 90 miles away to run his redundant datacenter operations. Why has he placed the datacenter that far away?
A. Because it is required by law
B. Network traffic latency concerns
C. Geographic dispersal
D. Geographic tax reasons
C. Geographic dispersal
Kevin discovered that his web server was being overwhelmed by traffic, causing a CPU bottleneck. Using the interface offered by his cloud service provider, he added another CPU to the server. What term best describes Kevin’s action?
A. Elasticity
B. Horizontal scaling
C. Vertical scaling
D. High availability
C. Vertical scaling
Fran’s organization uses a Type I hypervisor to implement an IaaS offering that it sells to customers. Which one of the following security controls is least applicable to this environment?
A. Customers must maintain security patches on guest operating systems.
B. The provider must maintain security patches on the hypervisor.
C. The provider must maintain security patches on the host operating system.
D. Customers must manage security groups to mediate network access to guest operating systems.
C. The provider must maintain security patches on the host operating system.
In what cloud security model does the cloud service provider bear the most responsibility for implementing security controls?
A. IaaS
B. FaaS
C. PaaS
D. SaaS
D. SaaS
Greg would like to find a reference document that describes how to map cloud security controls to different regulatory standards. What document would best assist with this task?
A. CSA CCM
B. NIST SP 500-292
C. ISO 27001
D. PCI DSS
A. CSA CCM