Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Question 1 8 ( 1 point ) Saved What ensures unauthorized data leakage does not occur? Question 1 8 options: Virtual LAN ( VLAN )

Question 18(1 point)
Saved
What ensures unauthorized data leakage does not occur?
Question 18 options:
Virtual LAN (VLAN) capability
Bandwidth rate limiting and threshold setting for Internet
Wireless access with WPA2-Enterprise
Network address translation (NAT)
Question 19(1 point)
Saved
Why would an organization have high-speed Internet pipes from two different Internet service providers?
Question 19 options:
For redundancy
For layered security
For dedicated Internet access
To extend broadcast domains to be extended to other geographical locations
Question 20(1 point)
Saved
Maya is a network engineer. She is planning to implement cloud-based Voice over Internet Protocol (VoIP), streaming, and time-sensitive applications. Maya wants to ensure that the wide area network (WAN) infrastructure can support these technologies and provide a good user experience. Which technology would be the best choice?
Question 20 options:
Integrated Services Digital Network (ISDN)
Satellite
Virtual private networking
Multiprotocol Label Switching (MPLS)
Question 21(1 point)
Saved
True or False? A network management dashboard is a collection of visual indicators that enable you to quickly see how well (or poorly) the network is functioning.
Question 21 options:
T
F
Question 22(1 point)
Saved
True or False? The P in FCAPS stands for physical.
Question 22 options:
F
T
Question 23(1 point)
Saved
True or False? A benchmark is the standard to which a system is compared to determine whether it is properly configured for optimal operation.
Question 23 options:
T
F
Question 24(1 point)
Saved
True or False? Organizations should have an agreement privileged users sign to acknowledge and accept restrictions of what they can do.
Question 24 options:
T
F
Question 25(1 point)
Saved
True or False? A nondisclosure agreement (NDA) prohibits accessors of intellectual property from divulging its contents to any other entity.
Question 25 options:
T
F
Question 26(1 point)
Saved
True or False? Network operations center (NOC) managers typically monitor infrastructure performance and overall health.
Question 26 options:
F
T
Question 27(1 point)
Saved
True or False? A network management system (NMS) should look for anything out of the ordinary and take action when it identifies unusual activity.
Question 27 options:
T
F
Question 28(1 point)
Saved
True or False? It is a good idea to have representatives from the finance and procurement departments on a change control board.
Question 28 options:
T
F
Question 29(1 point)
Saved
True or False? Asset management and inventory control have both a financial and an operational component.
Question 29 options:
T
F
Question 30(1 point)
Saved
True or False? Radio frequency identification (RFID) readers installed in mobile systems can inventory an entire warehouse in a matter of minutes.
Question 30 options:
T
F
Question 31(1 point)
Saved
All of the following are characteristics of a network operations center (NOC), except:
Question 31 options:
it is a central location used to monitor and control networks.
it is part of large enterprise environments only.
it contains a management console that is a collection of programs that provides administrators and operators with a view of alerts, alarms, and operational metrics.
it can be outsourced.
Question 32(1 point)
Saved
Which of the following describes how credentials are created and assigned for new personnel and how IT resource access is removed when any person leaves the organization?
Question 32 options:
Privileged user agreement
Password policy
On-boarding/off-boarding procedure
BYOD policy
Question 33(1 point)
Saved
Which of the following describes the need to maintain secondary copies of critical data and infrastructure components?
Question 33 options:
Nondisclosure agreement
Data loss prevention policy
On-boarding/off-boarding procedure
BYOD policy
Question 34(1 point)
Saved
Identify all single points of failure is an example of which type of best practice?
Question 34 options:
Preventive measure
Reacting to faults
Escalation
Communication
Question 35(1 point)
Saved
Which of the following is a reactive rather than proactive best practice?
Question 35 options:
Use automation whenever possible to detect and resolve faults.
Use the information at your disposal to predict likely faults before they occur.
Establish baselines and study normal operation to recognize behavior that isn't normal.
Identify the scope of the fault.
Question 36(1 point)
Saved
A formal process of comparing measurements to one or more baselines is referred to as:
Question 36 options:
a probe.
benchmarking.
gathering metrics.
an audit.
Question 37(1 point)
Saved
All of the following are true of a

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image_2

Step: 3

blur-text-image_3

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Database Design Application Development And Administration

Authors: Michael V. Mannino

3rd Edition

0071107010, 978-0071107013

More Books

Students also viewed these Databases questions

Question

an element of formality in the workplace between different levels;

Answered: 1 week ago