+
SEC 280 Final Exam

SEC 280 Final Exam

Rating:
Rating
(0)
Author: Christine Farr
Description:

http://www.devrygenius.com/product/sec-280-final-exam

SEC 280 Final Exam
1.Which of the following is true about the server virtualization (Hypervisor)?
a.Virtualization can only exist in one location
b.Virtualization can only access local disk storage
c.Virtualization cluster can use different type and brand of processors
d.Virtualization is useful for the software testing purposes, e.g., snapshotting.
2.Which of the following is true about Cloud Computing?
a.It is best for a small startup company
b.It is best for security sensitive information, e.g., top secret documents
c.It is best for a company cannot afford to lose the information, e.g., bank transactions
d.It is best for a company is in a remote area and it cannot obtain a reliable Internet connection
3.Which of the following is NOT an example of the business continuity?
a.Power outage for 3 hours
b.Chief Financial Officer involves an auto accident and cannot come to work for 3 days
c.A terrorist attack
d.An employee’s own laptop has been affected by virus
4.Which of the following is NOT a consideration of a backup strategy?
a.How much time do you have?
b.What is your network backbone speed?
c.How many monitor do you have?
d.What time to start the backup?
5.Comparing the difference between backup to disk and tape. What is one reason the tape is preferred?
a.Tape is much faster
b.Tape is much more expensive
c.Tape is water proof
d.Tape can be transport out of site for DR purpose
6.Which of the following is true about the SAN Snapshot?
a.It is taking a picture of the raw image of the disk
b.It makes a backup copy of the operating system
c.It makes a backup copy of the VMDK files
d.None of the above
7.Which of the following backup method requires the most of tape to restore?
a.Incremental
b.Differential
c.Full
d.Delta (application)
8.What is NOT the purpose of colocation?
a.To prevent power outage
b.To prevent data loss
c.To prevent nature disaster, e.g., flood
d.To prevent denial of services attack (DoS)
9.Which of the following is the most common and least expensive backup method?
a.File level (e.g., Windows file system)
b.Operating System level (e.g., VMware datastore)
c.Image level (e.g., SAN snapshot, Ghost)
d.All of the above
10.What is FALSE about data retention?
a.How much data I can write on the tape?
b.When I can re-write the tape?
c.When I must send my tapes to offsite vault such as Iron Mountain for monthly or weekly end backup
d.When I can erase the tape?
11.Which of the following about a wireless access point (in 802.11g standard) is true?
a.It operates like a hub and in half-duplex mode
b.It operates like a hub and in full-duplex mode
c.It operates like a switch and in half-duplex mode
d.It operates like a switch and in full-duplex mode
12.Which of the following 802.1x protocol (in a wireless setting) uses mutual authentication?
a.EAP-TLS
b.LEAP
c.PEAP
d.EAP-FAST
13.Per class lecture, which of the following technology is for Power Over Ethernet?
a.802.11n
b.802.3af
c.802.1x
d.802.11g
14.A bank has a Class-C IP address 192.168.10.0 and is to be subdivided into 2 branches. How many bit(s) need to be borrowed to accommodate 3 branches? (We are using the zero subnet 2s formula)


(more)
See More
Try a College Course Free

Sophia’s self-paced online courses are a great way to save time and money as you earn credits eligible for transfer to over 2,000 colleges and universities.*

Begin Free Trial
No credit card required

25 Sophia partners guarantee credit transfer.

221 Institutions have accepted or given pre-approval for credit transfer.

* The American Council on Education's College Credit Recommendation Service (ACE Credit®) has evaluated and recommended college credit for 20 of Sophia’s online courses. More than 2,000 colleges and universities consider ACE CREDIT recommendations in determining the applicability to their course and degree programs.

Tutorial