A user is asked to perform a risk analysis of a company. The user asks for the company asset database that contains a list of all equipment.The user uses this information as part of a risk analysis. Which type of risk analysis could be performed?

Chapter 6 Network Security and Risk Analysis Quiz

Quiz
•
Computers
•
12th Grade
•
Hard
Stella Lai
Used 1+ times
FREE Resource
17 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
exposure factor
hardware
quantitative
qualitative
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A user is evaluating the network infrastructure of a company. The user noted many redundant systems and devices in place, but no overall evaluation of the network. In a report, the user emphasized the methods and configurations needed as a whole to make the network fault tolerant. What is the type of design the user is stressing?
comprehensive
spanning tree
resilient
availability
3.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
A user has completed a six month project to identify all data locations and catalog the location. The next step is to classify the data and produce some criteria on data sensitivity. Which two steps can the user take to classify the data? (Choose two.)
Identify sensitivity of the data.
Determine how often data is backed up.
Determine the user of the data.
Treat all the data the same.
Establish the owner of the data.
4.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
A user needs to add redundancy to the routers in a company. What are the three options the user can use? (Choose three.)
IPFIX
STP
VRRP
HSRP
GLBP
5.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
A user is asked to evaluate the data center to improve availability for customers. The user notices that there is only one ISP connection, some of the equipment is out of warranty, there are no spare parts, and no one was monitoring the UPS which was tripped twice in one month. Which three deficiencies in high availability has the user identified? (Choose three.)
failure to prevent security incidents
single points of failure
failure to detect errors as they occur
failure to protect against poor maintenance
failure to design for reliability
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A company is concerned with traffic that flows through the network. There is a concern that there may be malware that exists that is not being blocked or eradicated by antivirus. What technology can be put in place to detect potential malware traffic on the network?
NAC
IPS
IDS
firewall
7.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
A user is a consultant who is hired to prepare a report to Congress as to which industries should be required to maintain five nine availability. Which three industries should the user include in a report? (Choose three.)
food service
healthcare
finance
education
public safety
Create a free account and access millions of resources
Similar Resources on Wayground
14 questions
Unit 2_Lesson 12 Computing Systems Test Study Guide

Quiz
•
9th - 12th Grade
20 questions
Computer Technology

Quiz
•
9th - 12th Grade
15 questions
CTec IT Level3 Unit 2 LO1 LO2 LO3 (2)

Quiz
•
12th Grade
12 questions
CamTech Network Security

Quiz
•
8th - 12th Grade
15 questions
Code.org Unit 2 - The Internet Review

Quiz
•
9th - 12th Grade
15 questions
Social Media Basics for Educators

Quiz
•
9th Grade - Professio...
20 questions
BTEC L3 IT - information systems

Quiz
•
12th Grade
16 questions
MTA Networking Fundamentals: Lesson 1

Quiz
•
11th Grade - University
Popular Resources on Wayground
25 questions
Equations of Circles

Quiz
•
10th - 11th Grade
30 questions
Week 5 Memory Builder 1 (Multiplication and Division Facts)

Quiz
•
9th Grade
33 questions
Unit 3 Summative - Summer School: Immune System

Quiz
•
10th Grade
10 questions
Writing and Identifying Ratios Practice

Quiz
•
5th - 6th Grade
36 questions
Prime and Composite Numbers

Quiz
•
5th Grade
14 questions
Exterior and Interior angles of Polygons

Quiz
•
8th Grade
37 questions
Camp Re-cap Week 1 (no regression)

Quiz
•
9th - 12th Grade
46 questions
Biology Semester 1 Review

Quiz
•
10th Grade