Computer Skills Questions
Explore questions in the Computer Skills category that you can ask Spark.E!
Which type of fire-suppression system is typically the safest for humans? (D4.3 L4.3.1)A) WaterB) DirtC) Oxygen-depletionD) Gaseous
A VLAN is a _____ method of segmenting networks. (D4.3 L4.3.3)A) SecretB) PhysicalC) RegulatedD) Logical
A device typically accessed by multiple users, often intended for a single purpose, such as managing email or web pages. (D4.1 L4.1.1)A) RouterB) SwitchC) ServerD) Laptop
An attacker outside the organization attempts to gain access to the organization's internal files. This is an example of a(n) ______. (D2, L2.1.1)A) IntrusionB) ExploitC) DisclosureD) Publication
Ludwig is a security analyst at Triffid, Inc. Ludwig notices network traffic that might indicate an attack designed to affect the availability of the environment. Which of the following might be the attack Ludwig sees? (D4.2 L4.2.1)A) DDOS (distributed denial of service)B) SpoofingC) Exfiltrating stolen dataD) An insider sabotaging the power supply
A tool that filters inbound traffic to reduce potential threats. (D4.2 L4.2.3)A) NIDS (network-based intrusion-detection systems)B) Anti-malwareC) DLP (data loss prevention)D) Firewall
Which of the following activities is usually part of the configuration management process, but is also extremely helpful in countering potential attacks? (D4.2 L4.2.3)A) Annual budgetingB) Conferences with senior leadershipC) Updating and patching systemsD) The annual shareholders' meeting
A human guard monitoring a hidden camera could be considered a ______ control. (D3, L3.2.1)A) DetectiveB) PreventiveC) DeterrentD) Logical
A device that filters network traffic in order to enhance overall security/performance. (D4.1 L4.1.1)A) EndpointB) LaptopC) MAC (media access control)D) Firewall
Which of the following would be best placed in the DMZ of an IT environment? (D4.3 L4.3.3)A) User's workplace laptopB) Mail serverC) Database engineD) SIEM log storage
Which of the following is probably most useful at the perimeter of a property? (D3, L3.2.1)A) A safeB) A fenceC) A data centerD) A centralized log storage facility
Larry and Fern both work in the data center. In order to enter the data center to begin their workday, they must both present their own keys (which are different) to the key reader, before the door to the data center opens.Which security concept is being applied in this situation? (D3, L3.1.1)A) Defense in depthB) Segregation of dutiesC) Least privilegeD) Dual control
In order for a biometric security to function properly, an authorized person's physiological data must be ______. (D3, L3.2.1)A) BroadcastB) StoredC) DeletedD) Modified
What is the goal of an incident response effort? (D2, L2.1.1)A) No incidents ever happenB) Reduce the impact of incidents on operationsC) Punish wrongdoersD) Save money
All of the following are typically perceived as drawbacks to biometric systems, except: (D3, L3.2.1)A) Lack of accuracyB) Potential privacy concernsC) Retention of physiological data past the point of employmentD) Legality
What is the most important goal of a business continuity effort? (D2, L2.2.1)A) Ensure all IT systems function during a potential interruptionB) Ensure all business activities are preserved during a potential disasterC) Ensure the organization survives a disasterD) Preserve health and human safety
Which of the following statements is true? (D3, L3.3.1)A) Logical access controls can protect the IT environment perfectly; there is no reason to deploy any other controlsB) Physical access controls can protect the IT environment perfectly; there is no reason to deploy any other controlsC) Administrative access controls can protect the IT environment perfectly; there is no reason to deploy any other controlsD) It is best to use a blend of controls in order to provide optimum security
What is the risk associated with resuming full normal operations too soon after a DR effort? (D2, L2.3.1)A) The danger posed by the disaster might still be presentB) Investors might be upsetC) Regulators might disapproveD) The organization could save money
What is the overall objective of a disaster recovery (DR) effort? (D2, L2.3.1)A) Save moneyB) Return to normal, full operationsC) Preserve critical business functions during a disasterD) Enhance public perception of the organization
At Parvi's place of work, the perimeter of the property is surrounded by a fence; there is a gate with a guard at the entrance. All inner doors only admit personnel with badges, and cameras monitor the hallways. Sensitive data and media are kept in safes when not in use. (D3, L3.1.1)A) Two-person integrityB) Segregation of dutiesC) Defense in depthD) Penetration testing
