Review Questions

1. 

What is the plan or policy that helps an organization determine how to relocate to an emergency site called?

  1. Disaster Recovery plan

  2. Backup Site plan

  3. Privilege Management policy

  4. Privacy plan

a. the disaster recovery plan deals with site relocations in the eventof an emergency, natural disaster, or service outage.

2. 

Which backup type is used for the immediate recovery of a lost file?

  1. Onsite storage

  2. Working copies

  3. Incremental backup

  4. Differential backup

b. working copies are backups that are usually kept in the computerroom for immediate use in a system recovery or lost file recovery.

3. 

Which system frequently has audit files that can be used for recovery?

  1. Database system

  2. Application server

  3. Backup server

  4. User system

a. large-scale database systems usually provide an audit file processthat allows transactions to be recovered in the event of a data loss.

4. 

Which backup system backs up only the files that have changed since the last backup?

  1. Full backup

  2. Incremental backup

  3. Differential backup

  4. Backup server

b. an incremental backup backs up files that have changed since thelast full or partial backup.

5. 

Which backup system backs up all of the files that have changed since the last full backup?

  1. Full backup

  2. Incremental backup

  3. Differential backup

  4. Archival backup

c. a differential backup backs up all of the files that have changedsince the last full backup.

6. 

Which backup method uses a rotating schedule of backup media to ensure long-term information storage?

  1. Grandfather, Father, Son method

  2. Full Archival method

  3. Backup Server method

  4. Differential Backup method

a. the grandfather, father, son method of backup is designed toprovide a rotating schedule of backup processes. this allows for aminimum usage of backup media, and it still allows for long-termarchiving.

7. 

Which site provides limited capabilities for the restoration of services in a disaster?

  1. Hot site

  2. Warm site

  3. Cold site

  4. Backup site

b. warm sites provide some capabilities in the event of a recovery.the organization that wants to use a warm site will need to install,configure, and reestablish operations on systems that may alreadyexist at the warm site.

8. 

What is an agreement between two organizations to provide mutual use of their sites in the event of an emergency called?

  1. Backup site agreement

  2. Warm site agreement

  3. Hot site agreement

  4. Reciprocal agreement

d. a reciprocal agreement is between two organizations and it allowsone to use the other organization's site in an emergency.

9. 

The process of automatically switching from a malfunctioning system to another system is called what?

  1. Fail safe

  2. Redundancy

  3. Fail-over

  4. Hot site

c. fail-over is the process where a system that is developing amalfunction automatically switches processes to another system tocontinue operations.

10. 

Which disk technology is not fault tolerant?

  1. RAID 0

  2. RAID 1

  3. RAID 3

  4. RAID 5

a. raid 0 is a method of spreading a single disk over a number ofdisk drives. this is primarily for performance purposes.

11. 

Which agreement outlines performance requirements for a vendor?

  1. MBTF

  2. MTTR

  3. SLA

  4. BCP

c. a service level agreement (sla) specifies performance requirementsfor a vendor. this agreement may use mbtf and mttr as performance measures in the sla.

12. 

The process of storing source code for use by the customer in the event that a vendor ceases business is called what?

  1. Code escrow

  2. SLA

  3. BCP

  4. CA

a. code escrow allows customers to access source code of systemsthat are installed under specific conditions, such as the bankruptcy ofa vendor.

13. 

Which policy describes how computer systems may be used within an organization?

  1. Due Care policy

  2. Acceptable Use policy

  3. Need to Know policy

  4. Privacy policy

b. the acceptable use policy dictates how computers can be usedwithin an organization. this policy should also outline consequencesof misuse.

14. 

Which policy dictates confidentiality requirements for customer records?

  1. Separation of Duties policy

  2. Due Care policy

  3. Physical Access policy

  4. Document Destruction policy

b. due care policies dictate the expected precautions to be used tosafeguard client records.

15. 

Which policy dictates how an organization manages certificates and certificate acceptance?

  1. Certificate policies

  2. Certificate access lists

  3. CA accreditation

  4. CRL rules

a. a certificate policy dictates how an organization uses, manages,and validates certificates.

16. 

Which party in a transaction is responsible for verifying the identity of a certificate holder?

  1. Subscriber

  2. Relying party

  3. Third party

  4. CA registrar

c. the third party is responsible for assuring the relying party thatthe subscriber is genuine.

17. 

Which of the following would not be part of an incident response policy?

  1. Outside agencies (that require status)

  2. Outside experts (to resolve the incident)

  3. Contingency plans

  4. Evidence collection procedures

c. a contingency plan would not normally be part of an incidentresponse plan. it would be part of a disaster recovery plan.

18. 

Which of the following groups is used to manage access in a network?

  1. Security group

  2. Single sign-on group

  3. Resource sharing group

  4. AD group

a. a security group is used to manage user access to a networkor system.

19. 

What is the process of inspecting procedures and verifying that they are working called?

  1. Audit

  2. Business Continuity plan

  3. Security review

  4. Group privilege management

a. an audit is used to inspect, test, and verify that procedures withinan organization are working and are up-to-date. the result of an auditis a report to management.

20. 

Which access model allows users some flexibility for information sharing purposes?

  1. DAC

  2. MAC

  3. RBAC

  4. MLAC

a. dac allows some flexibility in information sharing capabilitieswithin the network.

Answers

1. 

A. The disaster recovery plan deals with site relocations in the event of an emergency, natural disaster, or service outage.

2. 

B. Working copies are backups that are usually kept in the computer room for immediate use in a system recovery or lost file recovery.

3. 

A. Large-scale database systems usually provide an audit file process that allows transactions to be recovered in the event of a data loss.

4. 

B. An incremental backup backs up files that have changed since the last full or partial backup.

5. 

C. A differential backup backs up all of the files that have changed since the last full backup.

6. 

A. The Grandfather, Father, Son method of backup is designed to provide a rotating schedule of backup processes. This allows for a minimum usage of backup media, and it still allows for long-term archiving.

7. 

B. Warm sites provide some capabilities in the event of a recovery. The organization that wants to use a warm site will need to install, configure, and reestablish operations on systems that may already exist at the warm site.

8. 

D. A reciprocal agreement is between two organizations and it allows one to use the other organization's site in an emergency.

9. 

C. Fail-over is the process where a system that is developing a malfunction automatically switches processes to another system to continue operations.

10. 

A. RAID 0 is a method of spreading a single disk over a number of disk drives. This is primarily for performance purposes.

11. 

C. A service level agreement (SLA) specifies performance requirements for a vendor. This agreement may use MBTF and MTTR as performance measures in the SLA.

12. 

A. Code escrow allows customers to access source code of systems that are installed under specific conditions, such as the bankruptcy of a vendor.

13. 

B. The Acceptable Use policy dictates how computers can be used within an organization. This policy should also outline consequences of misuse.

14. 

B. Due Care policies dictate the expected precautions to be used to safeguard client records.

15. 

A. A Certificate policy dictates how an organization uses, manages, and validates certificates.

16. 

C. The third party is responsible for assuring the relying party that the subscriber is genuine.

17. 

C. A contingency plan would not normally be part of an incident response plan. It would be part of a disaster recovery plan.

18. 

A. A security group is used to manage user access to a network or system.

19. 

A. An audit is used to inspect, test, and verify that procedures within an organization are working and are up-to-date. The result of an audit is a report to management.

20. 

A. DAC allows some flexibility in information sharing capabilities within the network.



CompTIA Security+ Study Guide. Exam SY0-101
Security+ Study Guide
ISBN: 078214098X
EAN: 2147483647
Year: 2006
Pages: 167

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net