LAB 1
The backup folders create a system image
Every hour
Downloads
Forever
Until space is needed
Lab 2
+h
+A
-A
Documents
None of this are correct
Lab 3
All of this
All of this
Windows Sandbox
1.Which type of RAID is also known as disk striping?
RAID 0
2.Which of the following method ensures if a running virtual machine fails, the replicated virtual machine is restored and made online in a matter of minutes?
Replication
3.Which type of backup are you likely to perform with a virtual machine so that you can restore it to a specific point in time?
Snapshot
4.Which type of backup takes the least amount of time?
Incremental
5.Which of the following can be used to create a live boot media? [Choose all that apply]
DVD
USB
6.A risk analyst assigns a number and an impact severity against each risk identified in an organization’s infrastructure. Which of the following methods do the risk analyst use?
Quantitative Risk Analysis
7.Which of the following is defined as the loss in percentage an organization will suffer if a risk materializes?
Exposure Factor (EF)
8.Which of the following refers to the cost associated with a single realized risk against a specific asset?
Single Loss Expectancy (SLE)
9.Which of the following term describes implementing safeguards to eliminate vulnerabilities?
Risk Mitigation
10.Which of the following provides online backup storage?
Disk Shadowing
11.Which of the following makes copies of files as they are created/modified and periodically transmits them to a backup site?
Electronic Vaulting
12.Which of the following is the possible yearly cost of all instances of a specific threat realized against a specific asset?
Annual Loss Expectancy (ALE)
13.Which of the following can act as an Identity Provider for a Web application? [Choose all that apply]
Google
Github
Web application itself
Facebook
14.When using SSH keys to authenticate users, how many keys are involved?
2
15.When you create a user in a domain, to which of the group is the user added by default?
Domain Users
16.Which of the following allows you to add geographical information to the media, such as photographs?
Geotagging
17.In an Active Directory environment, at which level can you assign the password policy?
Domain
18.Information used to identify an individual is called_____________
Personally Identifiable Information (PII)
19.Who’s responsibility is it to delegate day-to-day maintenance to the data custodian?
Data Owner
20.Which of the following terms refers to the processing of data so that it can no longer be attributed to a specific data subject without the use of additional information?
Pseudonymization
21.Which of the following is the first phase of the information life cycle?
Acquisition
22.Data that helps an organization maintain competitive edge is referred to as______________
Proprietary Data
23.Which of the following roles ensure important data sets are developed, maintained and are accessible within their defined specifications
Data Custodian
Other Links:
Statistics Quiz
Networking Quiz
See other websites for quiz:
Check on QUIZLET
Check on CHEGG
.