Exam 13: Business Continuity
Exam 1: Introduction to Security50 Questions
Exam 2: Malware and Social Engineering Attacks50 Questions
Exam 3: Application and Networking-Based Attacks50 Questions
Exam 4: Host, Application, and Data Security50 Questions
Exam 5: Basic Cryptography50 Questions
Exam 6: Advanced Cryptography50 Questions
Exam 7: Network Security50 Questions
Exam 8: Administering a Secure Network50 Questions
Exam 9: Wireless Network Security50 Questions
Exam 10: Mobile Device Security50 Questions
Exam 11: Access Control Fundamentals50 Questions
Exam 12: Authentication and Account Management50 Questions
Exam 13: Business Continuity50 Questions
Exam 14: Risk Mitigation50 Questions
Exam 15: Vulnerability Assessment and Third Party Integration50 Questions
Select questions type
Select below the type of cluster that is used to provide high-availability applications that require a high level of read and write actions, such as databases, messaging systems, and file and print services:
(Multiple Choice)
4.9/5
(34)
Which term below describes a component or entity in a system which, if it no longer functions, will disable an entire system?
(Multiple Choice)
4.8/5
(48)
According to the Federal Bureau of Investigation (FBI), what percentage of crime committed today leaves behind digital evidence that can be retrieved via computer forensics?
(Multiple Choice)
4.9/5
(42)
Matching
-The maximum length of time that an organization can tolerate between backups.
(Multiple Choice)
4.8/5
(37)
A snapshot of the current state of a computer that contains all current settings and data is known as what option below:
(Multiple Choice)
4.8/5
(29)
RAM slack can contain any information that has been created, viewed, modified, downloaded, or copied since the computer was last booted.
(True/False)
4.9/5
(35)
RAID level 0 is known as disk mirroring, because it involves connecting multiple drives in the server to the same disk controller card.
(True/False)
4.8/5
(30)
Describe what happens when the response team arrives and secures the crime scene.
(Essay)
4.8/5
(34)
What RAID type below utilizes parity data across all drives instead of using a separate drive to hold parity error checking information?
(Multiple Choice)
4.9/5
(27)
What does Windows do if a file being saved is not long enough to fill up the last sector on the disk?
(Essay)
4.8/5
(37)
A system that can function for an extended period of time with little downtime is said to have ___________________.
(Short Answer)
4.8/5
(32)
What type of plans include procedures to address redundancy and fault tolerance as well as data backups?
(Multiple Choice)
4.8/5
(31)
Matching
-The ability of a business to continue to function in the even of a disaster.
(Multiple Choice)
5.0/5
(36)
Most metadata about a file is generated and recorded automatically without the user's knowledge.
(True/False)
4.8/5
(35)
A metallic enclosure that prevents the entry or escape of an electromagnetic field is known as a:
(Multiple Choice)
4.9/5
(27)
Showing 21 - 40 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)