1. A technician has discovered a crypto-virus infection on a workstation that has access to sensitive remote resources. Which of the following is the immediate NEXT step the technician should take?
A) Determine the source of the virus that has infected the workstation. B) Sanitize the workstation - s internal drive. C) Disable the network connections on the workstation. D) Reimage the workstation for normal operation.
2. A systems administrator has isolated an infected system from the network and terminated the malicious process from executing. Which of the following should the administrator do NEXT according to the incident response process?
A) Wipe the system. B) Notify regulations of the incident. C) Document the lessons learned. D) Restore lost data from a backup.
3. A wireless network uses a RADIUS server that is connected to an authenticator,which in turn connects to a supplicant. Which of the following represents the authentication architecture in use?
A) Captive portal B) 802.1x C) Open systems authentication D) RADIUS federation
4. In a corporation where compute utilization spikes several times a year,the Chief Information Officer (CIO) has requested a cost-effective architecture to handle the variable capacity demand. Which of the following characteristics BEST describes what the CIO has requested?
A) Redundancy B) Elasticity C) High availability D) Scalability
5. A systems administrator has isolated an infected system from the network and terminated the malicious process from executing. Which of the following should the administrator do NEXT according to the incident response process?
A) Document the lessons learned. B) Restore lost data from a backup. C) Determine the scope of impact. D) Wipe the system.
1. Right Answer: C Explanation:
2. Right Answer: D Explanation:
3. Right Answer: B Explanation:
4. Right Answer: B Explanation: Elasticity is defined as the degree to which a system is able to adapt to workload changes by provisioning and de-provisioning resources in an autonomic manner,such that at each point in time the available resources match the current demand as closely as possible.
Leave a comment