
Chapter 6 Network Security and Risk Analysis Quiz

Quiz
•
Computers
•
12th Grade
•
Hard
Stella Lai
Used 1+ times
FREE Resource
17 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A user is asked to perform a risk analysis of a company. The user asks for the company asset database that contains a list of all equipment.The user uses this information as part of a risk analysis. Which type of risk analysis could be performed?
exposure factor
hardware
quantitative
qualitative
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A user is evaluating the network infrastructure of a company. The user noted many redundant systems and devices in place, but no overall evaluation of the network. In a report, the user emphasized the methods and configurations needed as a whole to make the network fault tolerant. What is the type of design the user is stressing?
comprehensive
spanning tree
resilient
availability
3.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
A user has completed a six month project to identify all data locations and catalog the location. The next step is to classify the data and produce some criteria on data sensitivity. Which two steps can the user take to classify the data? (Choose two.)
Identify sensitivity of the data.
Determine how often data is backed up.
Determine the user of the data.
Treat all the data the same.
Establish the owner of the data.
4.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
A user needs to add redundancy to the routers in a company. What are the three options the user can use? (Choose three.)
IPFIX
STP
VRRP
HSRP
GLBP
5.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
A user is asked to evaluate the data center to improve availability for customers. The user notices that there is only one ISP connection, some of the equipment is out of warranty, there are no spare parts, and no one was monitoring the UPS which was tripped twice in one month. Which three deficiencies in high availability has the user identified? (Choose three.)
failure to prevent security incidents
single points of failure
failure to detect errors as they occur
failure to protect against poor maintenance
failure to design for reliability
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A company is concerned with traffic that flows through the network. There is a concern that there may be malware that exists that is not being blocked or eradicated by antivirus. What technology can be put in place to detect potential malware traffic on the network?
NAC
IPS
IDS
firewall
7.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
A user is a consultant who is hired to prepare a report to Congress as to which industries should be required to maintain five nine availability. Which three industries should the user include in a report? (Choose three.)
food service
healthcare
finance
education
public safety
Create a free account and access millions of resources
Similar Resources on Wayground
16 questions
IBA Chapter 8B

Quiz
•
8th - 12th Grade
20 questions
икт 21-40

Quiz
•
1st Grade - University
12 questions
AP CSP BI 4

Quiz
•
9th - 12th Grade
20 questions
CompTIA IT Fundamentals Practice

Quiz
•
9th Grade - University
14 questions
1.4 - Network Attacks

Quiz
•
7th - 12th Grade
17 questions
08 - Protecting Yourself QUIZ

Quiz
•
9th - 12th Grade
16 questions
IT Jobs and Careers

Quiz
•
9th - 12th Grade
15 questions
Cyber Security

Quiz
•
9th - 12th Grade
Popular Resources on Wayground
50 questions
Trivia 7/25

Quiz
•
12th Grade
11 questions
Standard Response Protocol

Quiz
•
6th - 8th Grade
11 questions
Negative Exponents

Quiz
•
7th - 8th Grade
12 questions
Exponent Expressions

Quiz
•
6th Grade
4 questions
Exit Ticket 7/29

Quiz
•
8th Grade
20 questions
Subject-Verb Agreement

Quiz
•
9th Grade
20 questions
One Step Equations All Operations

Quiz
•
6th - 7th Grade
18 questions
"A Quilt of a Country"

Quiz
•
9th Grade