Practice Free 100-160 Exam Online Questions
Which of the following is a key feature of a disaster recovery plan?
- A . Employee training
- B . Data encryption
- C . Offsite backups
- D . Regular software updates
C
Explanation:
Offsite backups are an essential feature of a disaster recovery plan. They involve storing copies of data in a separate physical location away from the primary site. In the event of a disaster, these backups ensure that data can be restored and accessed even if the primary site is no longer functional.
Which network infrastructure component allows for the translation of domain names to IP addresses?
- A . Firewall
- B . Router
- C . DNS server
- D . DHCP server
C
Explanation:
DNS (Domain Name System) is a network infrastructure component that translates domain names (e.g., www.example.com) into their corresponding IP addresses (e.g., 192.168.1.1). DNS servers maintain a distributed database that maps domain names to IP addresses, allowing users to access websites and other resources using easy-to-remember names instead of complex IP addresses.
What is the primary reason for isolating an infected system from the network during malware removal?
- A . To prevent further spread of the malware
- B . To avoid interference with malware removal tools
- C . To stop the infected system from collecting sensitive information
- D . To prevent unauthorized access to the system
A
Explanation:
Isolating an infected system from the network is crucial to prevent the malware from spreading to other devices or networks. This containment measure helps in limiting the impact of the infection and prevents potential damage or data breaches.
Vulnerability refers to:
- A . The degree to which a threat is capable of causing damage.
- B . The likelihood of a security incident occurring.
- C . The potential for loss or harm as a result of a threat exploiting a vulnerability.
- D . The exploitation of a vulnerability by a threat.
D
Explanation:
Vulnerability refers to a weakness or flaw in a system that can be exploited by a threat. It is the state of being exposed to the possibility of being attacked or harmed.
Which of the following is an integral part of the CIA triad in cybersecurity?
- A . Data loss prevention (DLP)
- B . Two-factor authentication (2FA)
- C . Intrusion Detection System (IDS)
- D . Firewall
B
Explanation:
The CIA triad in cybersecurity stands for confidentiality, integrity, and availability. Two-factor authentication (2FA) ensures confidentiality by adding an extra layer of security, requiring users to provide two forms of authentication before gaining access. It helps protect against unauthorized access and adds an additional level of assurance for ensuring data confidentiality.
What is an Advanced Persistent Threat (APT)?
- A . A vulnerability in network communication protocols.
- B . A cyberattack that compromises multiple devices simultaneously.
- C . A sophisticated and targeted attack that aims to gain unauthorized access and maintain persistence over a long period.
- D . A type of malware that spreads rapidly through a network.
C
Explanation:
Advanced Persistent Threats (APTs) are stealthy and prolonged attacks targeted at specific organizations or entities. APTs typically employ sophisticated techniques, including social engineering and zero-day exploits. The primary objectives of APTs are to gain unauthorized access, maintain persistence within the target network or system, and conduct reconnaissance or exfiltrate sensitive data without being detected for an extended period of time.
Which command-line tool is commonly used to test network connectivity and measure response time?
- A . netstat
- B . nslookup
- C . tcpdump
- D . ping
D
Explanation:
The correct command-line tool for testing network connectivity and measuring response time is ping. It sends ICMP echo request packets to a specified network device or IP address and waits for the corresponding echo reply, helping to verify if a host is reachable and measure packet latency. However, it is important to note that although ping can provide some basic network testing, it does not capture traffic or packet contents like tcpdump.
What is the purpose of conducting assessments of IT systems in the context of information security and change management?
- A . All of the above
- B . To assess the potential impact of changes on overall system performance
- C . To identify any vulnerabilities or weaknesses in the system
- D . To determine the level of compliance with regulatory requirements
A
Explanation:
Assessments of IT systems in the context of information security and change management serve multiple purposes. Firstly, they help identify any vulnerabilities or weaknesses in the system, enabling organizations to take necessary measures to strengthen security and protect against potential threats. Secondly, these assessments assist in determining the level of compliance with regulatory requirements, ensuring that the system meets necessary standards. Lastly, they help assess the potential impact of changes on overall system performance, allowing organizations to make informed decisions and minimize any disruptions. Therefore, all the options mentioned in the
Which technology is responsible for monitoring network traffic and identifying potential threats?
- A . IDS
- B . Firewall
- C . Server
- D . IPS
A
Explanation:
An Intrusion Detection System (IDS) is a technology that monitors network traffic and analyzes it for potential security breaches or vulnerabilities. It detects and alerts administrators to any suspicious activity, allowing them to take appropriate actions to mitigate potential threats.
When ranking risks, which of the following factors should be considered?
- A . All of the above.
- B . The cost associated with mitigating a risk.
- C . The potential impact or consequences of a risk.
- D . The likelihood of a risk occurring.
A
Explanation:
When ranking risks, it is important to consider multiple factors including the likelihood of a risk occurring, the potential impact or consequences of the risk, and the cost associated with mitigating the risk. Considering all these factors together helps prioritize the risks and allocate appropriate resources for risk management.