
Sec + CH9
Quiz by cool
Feel free to use or edit a copy
includes Teacher and Student dashboards
Measure skillsfrom any curriculum
Tag the questions with any skills you have. Your dashboard will track each student's mastery of each skill.
- edit the questions
- save a copy for later
- start a class game
- automatically assign follow-up activities based on students’ scores
- assign as homework
- share a link with colleagues
- print as a bubble sheet
- Q1
Naomi wants to deploy a tool that can allow her to scale horizontally while also allowing her to patch systems without interfering with traffic to her web server. What type of technology should she deploy?
A multipath network
A load balancer
NIC teaming
Geographic diversity
30s - Q2
Rick performs a backup that captures the changes since the last full backup. What type of backup has he performed?
An incremental backup
A snapshot
A new full backup
A differential backup
30s - Q3
What type of recovery site has some or most systems in place but does not have the data needed to take over operation?
A cloud site
A cold site
A hot site
A warm site
30s - Q4
Ben wants to implement a RAID array that combines both rad and write performance while retaining data integrity if a drive fails. Cost is not a concern compared to speed and resilience. What RAID type should he use?
RAID 6
RAID 5
RAID 10
RAID 1
30s - Q5
Cynthia wants to clone a virtual machine. What should she do to capture a live machine, including the machine state?
A differential backup
A full backup
A LiveCD
A snapshot
30s - Q6
Sally is working to restore her organization's operation after a disaster took her datacenter offline. What critical documents should she refer to as she restarts systems?
The TOTP documentation
The HOTP documentation
The last-known good configuration documentation
The restoration order documentation
30s - Q7
Mike wants to stop vehicles from traveling toward the entrance of his building. What physical security control should he implement?
An air gap
A hot aisle
A bollard
A robotic sentry
30s - Q8
Amanda wants to securely destroy data held on DVDs. Which of the following option is not a suitable solution for this?
Burning
Pulverizing
Shredding
Degaussing
30s - Q9
Why are Faraday cages deployed?
To prevent EMI
To prevent degaussing
To assist with fire suppression
To prevent tailgating
30s - Q10
Which of the following controls help prevent insider threats?
Air gaps
Reception desks and staff
Visitor logs
Two-person control
30s - Q11
Madhuri wants to implement a camera system but is concerned about the amount of storage space that the video recordings will require. What technology can help with this?
Motion detection
Facial recognition
Infrared cameras
PTZ
30s - Q12
What factor is a major reason organizations do not use security guard?
Cost
Social engineering
Training
Reliability
30s - Q13
Michelle wants to ensure that attackers who breach her network security perimeter cannot gain control of the systems that run the industrial processes her organization uses as part of their business. What type of solution is beat suited to this?
A screened subnet
A Faraday cage
An air gap
A cold aisle
30s - Q14
Kathleen wants to discourage potential attackers from entering the facility she is responsible for. Which of the following is not a common control used for this type of preventive defense?
Signs
Fences
Robotic sentries
Lighting
30s - Q15
How does technology diversity help ensure cybersecurity resilience?
If a single vendor goes out of business, the company does not need to replace its entire infrastructure.
It ensures that a vulnerability in a single company's product will not impact the entire infrastructure.
It means that a misconfiguration will not impact the company's entire infrastructure.
All of the above
30s