(221) Which of these common backup methods is the fastest when used on a daily basis?
A. Full backup
B. Incremental backup
C. Fast backup
D. Differential backup
Explanation:
The incremental backup method only copies files that have been recently changed or added. Only files with their archive bit set are backed up. Although this method is fast and uses less tape space, it has some vulnerabilities, such as the fact that all incremental backups need to be available and restored from the date of the last full backup to the desired date if a restore is required.
(222) Mirroring is another name for which RAID implementation?
A. RAID level 2
B. RAID level 3
C. RAID level 5
D. RAID level 1
Explanation:
RAID level 1 mirrors data from one or more disks to another disk or set of disks. Each drive is normally mirrored to an equal drive that is updated at the same time, thus allowing for recovery from the other drive if one drive should fail.
(223) Which of the following is not a common firewall function?
A. Logging Internet activity
B. Enforcing an organization�s security policy
C. Protecting against viruses
D. Limiting security exposures
Explanation:
Firewalls help to enforce a companys security policy and limit security exposures by filtering traffic passing to and from the Internet and the corporate network. A firewall does log Internet activity but does not typically protect against viruses.
(224) A particular disk drive system has 39 disks: 32 disks of user storage and 7 disks of error recovery coding. What type of system is this?
A. RAID level 2
B. RAID level 0
C. RAID level 1
D. RAID level 5
Explanation:
This type of drive is RAID level 2.
(225) Which of the following best describes a SYN flood?
A. Many new TCP connections in a short period of tim
B. Exceeding the limit of TCP connections on a system
C. Denial of service attack that sends a stream of ACK packets
D. Denial of service attack that sends a stream of SYN/ACK packets
Explanation:
A SYN flood is a form of denial-of-service attack in which an attacker sends a succession of SYN requests to a target’s system.
- Idham Azhari
Tidak ada komentar:
Posting Komentar