IS5403 Week 7 New

LAB 1

The backup folders create a system image

Every hour

Downloads

Forever

Until space is needed

Lab 2

+h

+A

-A

Documents

None of this are correct

Lab 3

All of this

All of this

Windows Sandbox

1.Which type of RAID is also known as disk striping?
RAID 0

2.Which of the following method ensures if a running virtual machine fails, the replicated virtual machine is restored and made online in a matter of minutes?
Replication

3.Which type of backup are you likely to perform with a virtual machine so that you can restore it to a specific point in time?
Snapshot

4.Which type of backup takes the least amount of time?
Incremental

5.Which of the following can be used to create a live boot media? [Choose all that apply]
DVD
USB

6.A risk analyst assigns a number and an impact severity against each risk identified in an organization’s infrastructure. Which of the following methods do the risk analyst use?
Quantitative Risk Analysis

7.Which of the following is defined as the loss in percentage an organization will suffer if a risk materializes?
Exposure Factor (EF)

8.Which of the following refers to the cost associated with a single realized risk against a specific asset?
Single Loss Expectancy (SLE)

9.Which of the following term describes implementing safeguards to eliminate vulnerabilities?
Risk Mitigation

10.Which of the following provides online backup storage?
Disk Shadowing

11.Which of the following makes copies of files as they are created/modified and periodically transmits them to a backup site?
Electronic Vaulting

12.Which of the following is the possible yearly cost of all instances of a specific threat realized against a specific asset?
Annual Loss Expectancy (ALE)

13.Which of the following can act as an Identity Provider for a Web application? [Choose all that apply]
Google
Github
Web application itself
Facebook

14.When using SSH keys to authenticate users, how many keys are involved?
2

15.When you create a user in a domain, to which of the group is the user added by default?
Domain Users

16.Which of the following allows you to add geographical information to the media, such as photographs?
Geotagging

17.In an Active Directory environment, at which level can you assign the password policy?
Domain

18.Information used to identify an individual is called_____________
Personally Identifiable Information (PII)

19.Who’s responsibility is it to delegate day-to-day maintenance to the data custodian?
Data Owner

20.Which of the following terms refers to the processing of data so that it can no longer be attributed to a specific data subject without the use of additional information?
Pseudonymization

21.Which of the following is the first phase of the information life cycle?
Acquisition

22.Data that helps an organization maintain competitive edge is referred to as______________
Proprietary Data

23.Which of the following roles ensure important data sets are developed, maintained and are accessible within their defined specifications
Data Custodian

Other Links:

Statistics Quiz


Networking Quiz


See other websites for quiz:

Check on QUIZLET


Check on CHEGG

.














Leave a Reply

Your email address will not be published. Required fields are marked *