Security+ Study Guide

1. 

What is the plan or policy that helps an organization determine how to relocate to an emergency site called?

  1. Disaster Recovery plan

  2. Backup Site plan

  3. Privilege Management policy

  4. Privacy plan

2. 

Which backup type is used for the immediate recovery of a lost file?

  1. Onsite storage

  2. Working copies

  3. Incremental backup

  4. Differential backup

3. 

Which system frequently has audit files that can be used for recovery?

  1. Database system

  2. Application server

  3. Backup server

  4. User system

4. 

Which backup system backs up only the files that have changed since the last backup?

  1. Full backup

  2. Incremental backup

  3. Differential backup

  4. Backup server

5. 

Which backup system backs up all of the files that have changed since the last full backup?

  1. Full backup

  2. Incremental backup

  3. Differential backup

  4. Archival backup

6. 

Which backup method uses a rotating schedule of backup media to ensure long-term information storage?

  1. Grandfather, Father, Son method

  2. Full Archival method

  3. Backup Server method

  4. Differential Backup method

7. 

Which site provides limited capabilities for the restoration of services in a disaster?

  1. Hot site

  2. Warm site

  3. Cold site

  4. Backup site

8. 

What is an agreement between two organizations to provide mutual use of their sites in the event of an emergency called?

  1. Backup site agreement

  2. Warm site agreement

  3. Hot site agreement

  4. Reciprocal agreement

9. 

The process of automatically switching from a malfunctioning system to another system is called what?

  1. Fail safe

  2. Redundancy

  3. Fail-over

  4. Hot site

10. 

Which disk technology is not fault tolerant?

  1. RAID 0

  2. RAID 1

  3. RAID 3

  4. RAID 5

11. 

Which agreement outlines performance requirements for a vendor?

  1. MBTF

  2. MTTR

  3. SLA

  4. BCP

12. 

The process of storing source code for use by the customer in the event that a vendor ceases business is called what?

  1. Code escrow

  2. SLA

  3. BCP

  4. CA

13. 

Which policy describes how computer systems may be used within an organization?

  1. Due Care policy

  2. Acceptable Use policy

  3. Need to Know policy

  4. Privacy policy

14. 

Which policy dictates confidentiality requirements for customer records?

  1. Separation of Duties policy

  2. Due Care policy

  3. Physical Access policy

  4. Document Destruction policy

15. 

Which policy dictates how an organization manages certificates and certificate acceptance?

  1. Certificate policies

  2. Certificate access lists

  3. CA accreditation

  4. CRL rules

16. 

Which party in a transaction is responsible for verifying the identity of a certificate holder?

  1. Subscriber

  2. Relying party

  3. Third party

  4. CA registrar

17. 

Which of the following would not be part of an incident response policy?

  1. Outside agencies (that require status)

  2. Outside experts (to resolve the incident)

  3. Contingency plans

  4. Evidence collection procedures

18. 

Which of the following groups is used to manage access in a network?

  1. Security group

  2. Single sign-on group

  3. Resource sharing group

  4. AD group

19. 

What is the process of inspecting procedures and verifying that they are working called?

  1. Audit

  2. Business Continuity plan

  3. Security review

  4. Group privilege management

20. 

Which access model allows users some flexibility for information sharing purposes?

  1. DAC

  2. MAC

  3. RBAC

  4. MLAC

Answers

1. 

A. The disaster recovery plan deals with site relocations in the event of an emergency, natural disaster, or service outage.

2. 

B. Working copies are backups that are usually kept in the computer room for immediate use in a system recovery or lost file recovery.

3. 

A. Large-scale database systems usually provide an audit file process that allows transactions to be recovered in the event of a data loss.

4. 

B. An incremental backup backs up files that have changed since the last full or partial backup.

5. 

C. A differential backup backs up all of the files that have changed since the last full backup.

6. 

A. The Grandfather, Father, Son method of backup is designed to provide a rotating schedule of backup processes. This allows for a minimum usage of backup media, and it still allows for long-term archiving.

7. 

B. Warm sites provide some capabilities in the event of a recovery. The organization that wants to use a warm site will need to install, configure, and reestablish operations on systems that may already exist at the warm site.

8. 

D. A reciprocal agreement is between two organizations and it allows one to use the other organization's site in an emergency.

9. 

C. Fail-over is the process where a system that is developing a malfunction automatically switches processes to another system to continue operations.

10. 

A. RAID 0 is a method of spreading a single disk over a number of disk drives. This is primarily for performance purposes.

11. 

C. A service level agreement (SLA) specifies performance requirements for a vendor. This agreement may use MBTF and MTTR as performance measures in the SLA.

12. 

A. Code escrow allows customers to access source code of systems that are installed under specific conditions, such as the bankruptcy of a vendor.

13. 

B. The Acceptable Use policy dictates how computers can be used within an organization. This policy should also outline consequences of misuse.

14. 

B. Due Care policies dictate the expected precautions to be used to safeguard client records.

15. 

A. A Certificate policy dictates how an organization uses, manages, and validates certificates.

16. 

C. The third party is responsible for assuring the relying party that the subscriber is genuine.

17. 

C. A contingency plan would not normally be part of an incident response plan. It would be part of a disaster recovery plan.

18. 

A. A security group is used to manage user access to a network or system.

19. 

A. An audit is used to inspect, test, and verify that procedures within an organization are working and are up-to-date. The result of an audit is a report to management.

20. 

A. DAC allows some flexibility in information sharing capabilities within the network.

Категории