1. Which of the following can degrade network performance?
A) Superfluous use of redundant load-sharing gateways B) Increasing traffic collisions due to host congestion by creating new collision domains C) Inefficient and superfluous use of network devices such as switches D) Inefficient and superfluous use of network devices such as hubs
2. Which of the following provide(s) near-immediate recoverability for time-sensitive systems and transaction processing?
A) Automated electronic journaling and parallel processing B) Data mirroring and parallel processing C) Data mirroring D) Parallel processing
3. What is an effective control for granting temporary access to vendors and external support personnel?
A) Creating user accounts that automatically expire by a predetermined date B) Creating permanent guest accounts for temporary use C) Creating user accounts that restrict logon access to certain hours of the day D) Creating a single shared vendor administrator account on the basis of least-privileged access
4. Which of the following help(s) prevent an organization's systems from participating in a distributed denial-of-service (DDoS) attack?
A) Inbound traffic filtering B) Using access control lists (ACLs) to restrict inbound connection attempts C) Outbound traffic filtering D) Recentralizing distributed systems
5. What is a common vulnerability, allowing denial-of-service attacks?
A) Assigning access to users according to the principle of least privilege B) Lack of employee awareness of organizational security policies C) Improperly configured routers and router access lists D) Configuring firewall access rules
1. Right Answer: D Explanation: Inefficient and superfluous use of network devices such as hubs can degrade network performance.
2. Right Answer: B Explanation: Data mirroring and parallel processing are both used to provide near- immediate recoverability for time-sensitive systems and transaction processing.
3. Right Answer: A Explanation: Creating user accounts that automatically expire by a predetermined date is an effective control for granting temporary access to vendors and external support personnel.
4. Right Answer: C Explanation: Outbound traffic filtering can help prevent an organization's systems from participating in a distributed denial-of-service (DDoS) attack.
5. Right Answer: C Explanation: Improperly configured routers and router access lists are a common vulnerability for denial-of- service attacks.
Leave a comment