IT212

.pdf

School

Butler Community College *

*We aren’t endorsed by this school

Course

212

Subject

Information Systems

Date

Apr 3, 2024

Type

pdf

Pages

25

Uploaded by ChefFogDinosaur5

Report
IT 212 Module 5 Quiz - NP6.0 Candidate: Marques Townsend (mtownz11) Date: 2/11/2024, 10:56:49 AM • Time Spent: 32:23 Score: 97% Passing Score: 65% Question 1. Correct Dan wants to implement reconnaissance countermeasures to help protect his DNS service. Which of the following actions should he take? Review company websites to see which type of sensitive information is being shared. Install patches against known vulnerabilities and clean up out-of-date zones, files, users, and groups. Implement policies that restrict the sharing of sensitive company information on employees' personal social media pages. Limit the sharing of critical information in press releases, annual reports, product catalogs, or marketing materials. Explanation Installing patches against known vulnerabilities and cleaning up out-of-date zones, files, users, and groups are good DNS reconnaissance countermeasures. Reviewing company websites to see which type of information is being shared about sensitive information is conforming to an Internet Information Sharing Policy. Implementing policies that restrict the sharing of sensitive company information on employees' personal social media pages is conforming to an Employee Social Media Information Sharing Policy.
Limiting the sharing of critical information in press releases, annual reports, product catalogs, and marketing materials is conforming to a Printed Materials Information Sharing Policy. References 13.1.1 Network Hardening Techniques 13.1.2 Network Hardening Techniques Facts 13.4.1 Update Deployment and Management 13.4.2 Configure an Update Server 13.4.3 Update Firmware 13.4.5 Update Deployment and Management Facts q_updated_management_patches_np6.question.fex Question 2. Correct While deploying Windows updates, when would you use the critical update ring? When deploying updates to users that want to stay on top of changes. When deploying updates to important systems (only after the update has been vetted). When deploying updates for any general user within the organization. When deploying updates to most of the organization in order to monitor for feedback. Explanation The critical deployment ring is for critical machines that you don't want to update until the update has been vetted. These are machines that are critical to the running of your organization or that are running essential projects. You can defer feature updates for up six months and quality improvement updates for up to 30 days. The preview ring is for those users who want to stay on top of changes and are on the cutting edge. They want to see the latest and greatest. This is called the Windows Insider Program. It allows you to get the most recent updates for your system. The broad ring includes the Semi-Annual Channel and is broadly deployed to most of the organization to monitor for feedback. References
13.1.1 Network Hardening Techniques 13.1.2 Network Hardening Techniques Facts 13.4.1 Update Deployment and Management 13.4.2 Configure an Update Server 13.4.3 Update Firmware 13.4.5 Update Deployment and Management Facts q_updated_management_critical_01_np6.question.fex Question 3. Correct When deploying Windows updates, when would you use the preview update ring? When deploying updates to most of the organization in order to monitor for feedback. When deploying updates to important machines (only after the update has been vetted). When deploying updates to users that want to stay on top of changes. When deploying updates for any general user within the organization. Explanation The preview ring is for those users who want to stay on top of changes and are on the cutting edge. They want to see the latest and greatest. This is called the Windows Insider Program. It allows you to get the most recent updates for your system. The critical deployment ring is for critical machines that you don't want to update until the update has been vetted. These are machines that are critical to the running of your organization or that are running important projects. You can defer feature updates for up six months and quality improvement updates for up to 30 days. The broad ring includes the Semi-Annual Channel and is broadly deployed to most of the organization to monitor for feedback. References 13.1.1 Network Hardening Techniques 13.1.2 Network Hardening Techniques Facts 13.4.1 Update Deployment and Management 13.4.2 Configure an Update Server 13.4.3 Update Firmware
13.4.3 Update Firmware 13.4.5 Update Deployment and Management Facts q_updated_management_critical_02_np6.question.fex Question 4. Correct Which backup strategy backs up all files from a computer's file system (regardless of whether the file's archive bit is set or not) and then marks them as backed up? Incremental Full Differential Copy Explanation A full backup backs up all files from a computer's file system regardless of whether a file's archive bit is turned on or off. It also marks them as backed up. Incremental and differential backups only back up files that have their archive bit set. The copy backup strategy is used by the NTBACKUP.EXE backup utility on Windows servers. It backs up all files regardless of whether the archive bit is set. However, it does not mark them as backed up. References 11.7.3 Data Backup and Storage Facts q_backup_restore_full_01_np6.question.fex Question 5. Correct You just deployed a new Cisco router that connects several network segments in your organization. The router is physically located in a server room that requires an ID card for access. You backed up the router configuration to a remote location with an encrypted file. You access the router configuration interface from your notebook computer using a Telnet client with the username admin and the password admin. You used the MD5 hashing algorithm to protect the password. What else should you do to increase the security of this device? (Select two.) Use a web browser to access the router
Use a web browser to access the router configuration using an HTTP connection. Use TFTP to back up the router configuration to a remote location. Use encrypted Type 7 passwords. Change the default administrative username and password. Use an SSH client to access the router configuration. Explanation In this scenario, you need to address the following two key security issues: You should use an SSH (Secure Shell) client to access the router configuration. Telnet transfers data over the network connection in cleartext, exposing sensitive data to sniffing. You should change the default administrative username and password. Default usernames and passwords are readily available from websites on the internet. Encrypted Type 7 passwords on a Cisco device are less secure than those protected with MD5. Using HTTP and TFTP (Trivial File Transfer Protocol) to manage the router configuration could expose sensitive information to sniffers, as they transmit data in cleartext. References 11.8.1 Remote Management 11.8.2 Use Remote Desktop 11.8.4 Remote Management Facts q_remote_manage_ssh_01_np6.question.fex Question 6. Correct Which of the following is a protocol used for terminal emulation? SSH ICA RDP VNC Explanation
Explanation Most administrators use Secure Shell (SSH) for terminal emulation. VNC, ICA, and RDP are remote access protocols. References 11.8.1 Remote Management 11.8.2 Use Remote Desktop 11.8.4 Remote Management Facts q_remote_manage_ssh_02_np6.question.fex Question 7. Incorrect Which of the following are backed up during an incremental backup? Only files that have changed since the last full or differential backup. Only files that have changed since the last full backup. Only files that have changed since the last full or incremental backup. Only files that are new since the last full or incremental backup. Explanation An incremental backup only captures files that have changed since the last full or incremental backup. The primary attraction to this backup plan is that it requires less storage space and processing time to complete. Restoration starts from the last full backup and then requires the loading of each subsequent incremental backup for a full restoration. References 11.7.3 Data Backup and Storage Facts q_backup_restore_incremental_01_np6.question.fex
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help