Module 5: Cybersecurity Operations Quiz Answers

Cybersecurity Essentials Module 5 Quiz Answers

Module 5: Cybersecurity Operations Quiz Question Answers

1. @Apollo is running a routine audit of the server hardware in the company data center. Several servers are using single drives to host operating systems and multiple types of attached storage solutions for storing data. They want to find a better solution to provide fault tolerance during a drive failure. Which solution is best?

  • Offsite backup
  • UPS
  • RAID
  • Tape backup

Explanation: Fault tolerance is addressing a single point of failure, in this case the hard drives.

2. @Apollo is evaluating its data center to improve availability. The technicians notice that there is only one router, some of the equipment is out of warranty, there are no spare parts and no one monitors the UPS, which was tripped twice in one month. Which deficiencies in high availability has @Apollo identified? (Select three answers)

  • Failure to identify management issues
  • Failure to prevent security incidents
  • Failure to detect errors as they occur
  • Failure to design for reliability
  • Single points of failure
  • Failure to protect against poor maintenance

Explanation: A data center needs to be designed from the outset for high availability with no single points of failure.

3. Apollo is purchasing a new server for the company data center. The user wants to most efficiently utilize the capacity of three disks with redundancy. Which RAID level should the user implement?

  • 1+0
  • 0
  • 1
  • 5

Explanation: RAID 5 striping with parity would be the best choice.

4. Which industries should be required to maintain five nines availability? (Select three answers)

  • Healthcare
  • Education
  • Food service
  • Public safety
  • Retail
  • Finance

Explanation: Industries that are critical to everyday life like financial, healthcare, and public safety should have systems that are available 99.999% of the time (the five nines principle).

5. You have been asked to perform an analysis of the current state of an organization’s network. What would you use to scan the network only for security risks?

  • Vulnerability scanner
  • Packet analyzer
  • Pen test
  • Malware

Explanation: Vulnerability scanners are commonly used to scan for the following vulnerabilities:
Use of default passwords or common passwords
Missing patches
Open ports
Misconfiguration of operating systems and software
Active IP addresses

6. @Apollo is evaluating its network infrastructure. They have noted that many redundant systems and devices are in place, but there is no overall evaluation of the network. A report emphasized the methods and configurations needed as a whole to make the network fault tolerant. What is the type of design @Apollo is advocating for?

  • Resilient
  • Spanning tree
  • Availability
  • Comprehensive

Explanation: In order to deploy a resilient design, it is critical to understand the needs of a business and then incorporate redundancy to address those needs.

7. Which of the following types of power issues should a technician be concerned about? (Select three correct answers)

  • Blackout
  • Spark
  • Flicker
  • Brownout
  • Fuzzing
  • Spike

Explanation: Power issues include increases, decreases, or sudden changes in power and include the following:
Inrush Current

8. Which of the following devices represent examples of physical access controls? (Select three correct answers)

  • Routers
  • Locks
  • Servers
  • Video cameras
  • Swipe cards
  • Firewalls

Explanation: Physical access controls include but are not limited to the following:Guards
Motion detectors
Laptop locks
Locked doors
Swipe cards
Guard dogs
Video cameras

9. What design principles help to ensure high availability? (Select three answers)

  • Using encryption
  • Ensuring confidentiality
  • Eliminating single points of failure
  • Providing for reliable crossover
  • Detecting failures as they occur
  • Checking for data consistency

Explanation: High availability systems typically include these three design principles.

10. An organization is looking to implement biometric access to its data center but is concerned that people may be able to circumvent the system by being falsely accepted as legitimate users. What type of error is such false acceptance?

  • Type II
  • False rejection
  • Type I
  • CER

Explanation: There are two types of errors that biometrics can have: false acceptance and false rejection. False acceptance is a Type II error. The two types can intersect at a point called the crossover error rate.

Notify of

Inline Feedbacks
View all comments
Would love your thoughts, please comment.x