IT212
.pdf
keyboard_arrow_up
School
Butler Community College *
*We aren’t endorsed by this school
Course
212
Subject
Information Systems
Date
Apr 3, 2024
Type
Pages
25
Uploaded by ChefFogDinosaur5
IT 212 Module 5 Quiz - NP6.0
Candidate: Marques Townsend (mtownz11)
Date: 2/11/2024, 10:56:49 AM • Time Spent: 32:23
Score: 97%
Passing Score: 65%
Question 1.
Correct
Dan wants to implement reconnaissance countermeasures to help protect his DNS service.
Which of the following actions should he take?
Review company websites to see which type of
sensitive information is being shared.
Install patches against known vulnerabilities
and clean up out-of-date zones, files, users,
and groups.
Implement policies that restrict the sharing of
sensitive company information on employees'
personal social media pages.
Limit the sharing of critical information in
press releases, annual reports, product
catalogs, or marketing materials.
Explanation
Installing patches against known vulnerabilities and cleaning up out-of-date zones, files,
users, and groups are good DNS reconnaissance countermeasures.
Reviewing company websites to see which type of information is being shared about
sensitive information is conforming to an Internet Information Sharing Policy.
Implementing policies that restrict the sharing of sensitive company information on
employees' personal social media pages is conforming to an Employee Social Media
Information Sharing Policy.
Limiting the sharing of critical information in press releases, annual reports, product
catalogs, and marketing materials is conforming to a Printed Materials Information
Sharing Policy.
References
13.1.1 Network Hardening Techniques
13.1.2 Network Hardening Techniques Facts
13.4.1 Update Deployment and Management
13.4.2 Configure an Update Server
13.4.3 Update Firmware
13.4.5 Update Deployment and Management Facts
q_updated_management_patches_np6.question.fex
Question 2.
Correct
While deploying Windows updates, when would you use the critical update ring?
When deploying updates to users that want to
stay on top of changes.
When deploying updates to important systems
(only after the update has been vetted).
When deploying updates for any general user
within the organization.
When deploying updates to most of the
organization in order to monitor for feedback.
Explanation
The critical deployment ring is for critical machines that you don't want to update until the
update has been vetted. These are machines that are critical to the running of your
organization or that are running essential projects. You can defer feature updates for up
six months and quality improvement updates for up to 30 days.
The preview ring is for those users who want to stay on top of changes and are on the
cutting edge. They want to see the latest and greatest. This is called the Windows Insider
Program. It allows you to get the most recent updates for your system.
The broad ring includes the Semi-Annual Channel and is broadly deployed to most of the
organization to monitor for feedback.
References
13.1.1 Network Hardening Techniques
13.1.2 Network Hardening Techniques Facts
13.4.1 Update Deployment and Management
13.4.2 Configure an Update Server
13.4.3 Update Firmware
13.4.5 Update Deployment and Management Facts
q_updated_management_critical_01_np6.question.fex
Question 3.
Correct
When deploying Windows updates, when would you use the preview update ring?
When deploying updates to most of the
organization in order to monitor for feedback.
When deploying updates to important
machines (only after the update has been
vetted).
When deploying updates to users that want to
stay on top of changes.
When deploying updates for any general user
within the organization.
Explanation
The preview ring is for those users who want to stay on top of changes and are on the
cutting edge. They want to see the latest and greatest. This is called the Windows Insider
Program. It allows you to get the most recent updates for your system.
The critical deployment ring is for critical machines that you don't want to update until the
update has been vetted. These are machines that are critical to the running of your
organization or that are running important projects. You can defer feature updates for up
six months and quality improvement updates for up to 30 days.
The broad ring includes the Semi-Annual Channel and is broadly deployed to most of the
organization to monitor for feedback.
References
13.1.1 Network Hardening Techniques
13.1.2 Network Hardening Techniques Facts
13.4.1 Update Deployment and Management
13.4.2 Configure an Update Server
13.4.3 Update Firmware
13.4.3 Update Firmware
13.4.5 Update Deployment and Management Facts
q_updated_management_critical_02_np6.question.fex
Question 4.
Correct
Which backup strategy backs up all files from a computer's file system (regardless of
whether the file's archive bit is set or not) and then marks them as backed up?
Incremental
Full
Differential
Copy
Explanation
A full backup backs up all files from a computer's file system regardless of whether a file's
archive bit is turned on or off. It also marks them as backed up.
Incremental and differential backups only back up files that have their archive bit set. The
copy backup strategy is used by the NTBACKUP.EXE backup utility on Windows servers. It
backs up all files regardless of whether the archive bit is set. However, it does not mark
them as backed up.
References
11.7.3 Data Backup and Storage Facts
q_backup_restore_full_01_np6.question.fex
Question 5.
Correct
You just deployed a new Cisco router that connects several network segments in your
organization.
The router is physically located in a server room that requires an ID card for access. You
backed up the router configuration to a remote location with an encrypted file. You access
the router configuration interface from your notebook computer using a Telnet client with
the username admin and the password admin. You used the MD5 hashing algorithm to
protect the password.
What else should you do to increase the security of this device? (Select two.)
Use a web browser to access the router
Use a web browser to access the router
configuration using an HTTP connection.
Use TFTP to back up the router configuration
to a remote location.
Use encrypted Type 7 passwords.
Change the default administrative username
and password.
Use an SSH client to access the router
configuration.
Explanation
In this scenario, you need to address the following two key security issues:
You should use an SSH (Secure Shell) client to access the router configuration. Telnet
transfers data over the network connection in cleartext, exposing sensitive data to
sniffing.
You should change the default administrative username and password. Default
usernames and passwords are readily available from websites on the internet.
Encrypted Type 7 passwords on a Cisco device are less secure than those protected with
MD5.
Using HTTP and TFTP (Trivial File Transfer Protocol) to manage the router configuration
could expose sensitive information to sniffers, as they transmit data in cleartext.
References
11.8.1 Remote Management
11.8.2 Use Remote Desktop
11.8.4 Remote Management Facts
q_remote_manage_ssh_01_np6.question.fex
Question 6.
Correct
Which of the following is a protocol used for terminal emulation?
SSH
ICA
RDP
VNC
Explanation
Explanation
Most administrators use Secure Shell (SSH) for terminal emulation.
VNC, ICA, and RDP are remote access protocols.
References
11.8.1 Remote Management
11.8.2 Use Remote Desktop
11.8.4 Remote Management Facts
q_remote_manage_ssh_02_np6.question.fex
Question 7.
Incorrect
Which of the following are backed up during an incremental backup?
Only files that have changed since the last full
or differential backup.
Only files that have changed since the last full
backup.
Only files that have changed since the last full
or incremental backup.
Only files that are new since the last full or
incremental backup.
Explanation
An incremental backup only captures files that have changed since the last full or
incremental backup. The primary attraction to this backup plan is that it requires less
storage space and processing time to complete. Restoration starts from the last full backup
and then requires the loading of each subsequent incremental backup for a full
restoration.
References
11.7.3 Data Backup and Storage Facts
q_backup_restore_incremental_01_np6.question.fex
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help