front 1 A user copies files from her desktop computer to a USB flash device
and puts the device into her pocket. Which of Confidentiality | back 1 Confidentiality |
front 2 Smart phones with cameras and internet capabilities pose a risk to which security concept? Confidentiality | back 2 Confidentiality |
front 3 By definition, which security concept ensures that only authorized parties can access data? Confidentiality | back 3 Confidentiality |
front 4 Your computer system is a participant in an asymmetric cryptography
system. You've created a message to send to another user. Before
transmission, you hash the message and encrypt the hash using your
private key. You then attach In this example, what protection does the hashing activity provide? Availability | back 4 Integrity |
front 5 Which of the following is an example of an internal threat? A server back door allows an attacker on the internet to gain access to the intranet site. A user accidentally deletes the new product designs. A water pipe in the server room breaks. A delivery man is able to walk into a controlled area and steal a laptop | back 5 A user accidentally deletes the new product designs. |
front 6 What is the greatest threat to the confidentiality of data in most secure organizations? Operator error | back 6 USB devices |
front 7 Which of the following is the correct definition of a threat? Instance of exposure to losses from an attacker The likelihood of an attack taking advantage of a vulnerability Absence or weakness of a safeguard that could be exploited Any potential danger to the confidentiality, integrity, or availability of information or systems | back 7 Any potential danger to the confidentiality, integrity, or availability of information or systems |
front 8 Which of the following is an example of a vulnerability? Virus infection A misconfigured server Denial of service attack Unauthorized access to confidential resources | back 8 A misconfigured server |
front 9 By definition, which security concept uses the ability to prove that a sender sent an encrypted message? Privacy | back 9 Non-repudiation |
front 10 Which of the following is not a valid concept to associate with integrity? Prevent the unauthorized change of data Ensure that your systems record the real information when collecting data Control access to resources to prevent unwanted access Protect your environment so it maintains the highest source of truth | back 10 Control access to resources to prevent unwanted access |
front 11 Which of the following threat actors seeks to defame, shed light on, or cripple an organization or government? Hacktivist | back 11 Hacktivist |
front 12 Which of the following is the best definition of the term hacker? The most organized, well-funded, and dangerous type of threat actor. A general term used to describe any individual who uses their
technical knowledge to gain unauthorized access A threat actor who lacks skills and sophistication but wants to impress their friends or garner attention. A threat actor whose main goal is financial gain. Any individual whose attacks are politically motivated. | back 12 A general term used to describe any individual who uses their
technical knowledge to gain unauthorized access |
front 13 The IT manager in your organization proposes taking steps to protect
against a potential threat actor. The proposal Which type of threat actor do these steps guard against?
| back 13 Insider |
front 14 A script kiddie is a threat actor who lacks knowledge and sophistication. Script kiddie attacks often seek to exploit well-known vulnerabilities in systems. What is the best defense against script kiddie attacks? Implement email filtering systems. Have appropriate physical security controls in place. Properly secure and store data backups. Build a comprehensive security approach that uses all aspects of threat prevention and protection. Keep systems up-to-date and use standard security practices. | back 14 Keep systems up-to-date and use standard security practices. |
front 15 Which of the following is a security approach that combines multiple
security controls and defenses and is sometimes Cumulative security | back 15 Layered security |
front 16 Which of the following reduce the risk of a threat agent being able to exploit a vulnerability? Implementation of VLANs | back 16 Countermeasures |
front 17 Which of the following is the single greatest threat to network security? Email phishing | back 17 Employees |
front 18 Which type of media preparation is sufficient for media that will be
reused in different security contexts within your Formatting | back 18 Sanitization |
front 19 Which of the following is an example of privilege escalation? Mandatory vacations | back 19 Creeping privileges |
front 20 Which security principle prevents any one administrator from having
sufficient access to compromise the security of Separation of duties | back 20 Separation of duties |
front 21 You assign access permissions so that users can only access the
resources required to accomplish their specific work Cross-training | back 21 Principle of least privilege |
front 22 An access control list (ACL) contains a list of users and allowed
permissions. What is it called if the ACL Explicit allow | back 22 Implicit deny |
front 23 You want to make sure that any reimbursement checks issued by your company cannot be issued by a single person. Which security principle should you implement to accomplish this goal? Mandatory vacations | back 23 Separation of duties |
front 24 You are concerned that the accountant in your organization might have
the chance to modify financial information and Which security principle are you implementing by periodically shifting accounting responsibilities? Job rotation | back 24 Job rotation |
front 25 You want to implement an access control list where only the users you
specifically authorize have access to the resource. Anyone not on the
list should be prevented from having access. Implicit allow, explicit deny | back 25 Explicit allow, implicit deny |
front 26 Which of the following principles is implemented in a mandatory access control model to determine object access by classification level? Ownership | back 26 Need to know |
front 27 What is the primary purpose of separation of duties? Increase the difficulty of performing administration Grant a greater range of control to senior management Inform managers that they are not trusted Prevent conflicts of interest | back 27 Prevent conflicts of interest |
front 28 Separation of duties is an example of which type of access control? Preventive | back 28 Preventive |
front 29 Need to know access is required to access which types of resources? Low-security resources | back 29 Compartmentalized resources |
front 30 When a cryptographic system is used to protect the data
confidentiality, what actually takes place? Unauthorized users are prevented from viewing or accessing the resource Transmitting the encrypted data is prohibited | back 30 Unauthorized users are prevented from viewing or accessing the resource |
front 31 Which type of cipher changes the position of the characters in a plain text message? Block | back 31 Transposition |
front 32 Which is the cryptography mechanism that hides secret communications within various forms of data? Codes | back 32 Steganography |
front 33 Which of the following is not a valid example of steganography? Hiding text messages within graphical images | back 33 Encrypting a data file with an encryption key |
front 34 Which of the following encryption methods combines a random value with plain text to produce ciphertext? Steganography | back 34 One-time pad |
front 35 What is the cryptography method of recovering original data that has
been encrypted without having access to the key Steganography | back 35 Cryptanalysis |
front 36 Which of the following tools would you use to validate the bandwidth
on your network and identify when the Load tester | back 36 Throughput tester |
front 37 You are running a packet sniffer on your workstation so you can identify the types of traffic on your network. You expect to see all the traffic on the network, but the packet sniffer only seems to be capturing frames that are addressed to the network interface on your workstation. Which of the following must you configure in order to see all of the network traffic? Configure the network interface to use port mirroring mode
| back 37 Configure the network interface to use promiscuous mode |
front 38 You want to examine the data on your network to find out if any of
the following are happening: Which of the following tools would you use? Protocol analyzer | back 38 Protocol analyzer |
front 39 Which of the following tools would you use to simulate a large number of client connections to a website, test file downloads for an FTP site, or simulate large volumes of email? Protocol analyzer | back 39 Load tester |
front 40 Which of the following accurately describes what a protocol analyzer is used for? (Select two.) A device that can simulate a large number of client connections to a website, test file downloads for an FTP site, or simulate large volumes of email. A passive device that is used to copy frames and allow you to view frame contents. A device that allows you to capture, modify, and retransmit frames (to perform an attack). A device that does not allow you to capture, modify, and retransmit frames (to perform an attack). A device that measures the amount of data that can be transferred through a network or processed by a device. | back 40 A passive device that is used to copy frames and allow you to view frame contents. A device that does not allow you to capture, modify, and retransmit frames (to perform an attack). |
front 41 After an intrusion has occurred and the intruder has been removed from the system, which of the following is the best next step or action to take? Restore and repair any damage | back 41 Back up all logs and audits regarding the incident |
front 42 Which of the following is an important aspect of evidence gathering?
| back 42 Backing up all log files and audit trails |
front 43 During a recent site survey, you found a rogue wireless access point
on your network. Which of the following actions should you take first
to protect your network while still preserving evidence? | back 43 Disconnect the access point from the network |
front 44 You have discovered a computer that is connected to your network and
was used for an attack. You have disconnected the computer from the
network to isolate it and stop the attack. | back 44 Perform a memory dump |
front 45 You are conducting a forensic investigation. The attack has been stopped. Which of the following actions should you perform first? remove the hard drive | back 45 Document what's on the screen |
front 46 Which method can you use to verify that a bit-level image copy of a hard drive is an exact clone of the original hard drive collected as evidence? File directory listing | back 46 Hashing |
front 47 When duplicating a drive for forensic investigation purposes, which of the following copying methods is most appropriate? File-by-file copying | back 47 Bit-level cloning |
front 48 How can a criminal investigator ensure the integrity of a removable media device found while collecting evidence? Write a log file to the media | back 48 Create a checksum using a hashing algorithm |
front 49 You manage the network for your company. You have recently discovered
information on a computer hard drive that might indicate evidence of
illegal activity. You want to perform forensic activities on the disk
to see what kind of information it contains. | back 49 Make a bit-level copy of the disk |
front 50 What is the best definition of a security incident? Interruption of productivity | back 50 Violation of a security policy |
front 51 What is the most important element related to evidence in addition to the evidence itself? Photographs of the crime scene | back 51 Chain of custody document |
front 52 The chain of custody is used for which purposes? Retaining evidence integrity | back 52 Listing people coming into contact with evidence |
front 53 You have been asked to draft a document related to evidence-gathering that contains details about personnel in possession and control of evidence from the time of discovery up through the time of presentation in court. What type of document is this? CPS (certificate practice statement) | back 53 Chain of custody |
front 54 Which of the following is defined as a contract that prescribes the
technical support or business parameters a provider will bestow to its
client? | back 54 Service level agreement |
front 55 HIPAA is a set of federal regulations that define security
guidelines. What do HIPAA guidelines protect? | back 55 Privacy |
front 56 What is a service level agreement (SLA)? | back 56 A guarantee of a specific level of service |
front 57 A Service Level Agreement (SLA) defines the relationship and
contractual responsibilities of providers and service recipients.
Which of the following characteristics are most important when
designing an SLA? (Select two.) | back 57 Detailed provider responsibilities for all continuity and disaster
recovery mechanisms. |
front 58 You plan to implement a new security device on your network. Which of
the following policies outlines the process you should follow before
implementing that device? | back 58 Change management |
front 59 When you inform an employee that they are being terminated, what is
the most important activity? | back 59 Disabling their network access |
front 60 What is the most effective way to improve or enforce security in any
environment? | back 60 Providing user-awareness training |
front 61 You have a set of DVD-RW discs that have been used to archive files
for your latest development project. You need to dispose of the discs.
| back 61 Shred the disks |
front 62 Which of the following best describes the concept of due care or due
diligence? | back 62 Reasonable precautions based on industry best practices are utilized and documented. |
front 63 Which of the following is an example of a strong password? | back 63 a8bT11$yi |
front 64 Which of the following is a recommendation to use when a specific
standard or procedure does not exist? | back 64 Guideline |
front 65 Which of the following is the best protection against security
violations? | back 65 Defense-in-depth |
front 66 What is the primary purpose of source code escrow? To hold funds in reserve for unpredicted costs before paying the fees of the programmer | back 66 To obtain change rights over software after the vendor goes out of business |
front 67 Change control should be used to oversee and manage changes over what
aspect of an organization? | back 67 Every aspect |
front 68 You have recently discovered that a network attack has compromised
your database server. The attacker may have stolen customer credit
card numbers. You have stopped the attack and implemented security
measures to prevent the same incident from occurring in the future.
| back 68 Contact your customers to let them know about the security breach |
front 69 Which of the following is not an appropriate response to a risk
discovered during a risk analysis? | back 69 Denial |
front 70 Which of the following best defines Single Loss Expectancy (SLE)?
| back 70 The total monetary loss associated with a single occurrence of a threat |
front 71 What is the average number of times that a specific risk is likely to
be realized in a single year? | back 71 Annualized rate of occurrence |
front 72 Your company has developed and implemented countermeasures for the
greatest risks to their assets. However, there is still some risk
left. What is the remaining risk called? | back 72 Residual risk |
front 73 Which of the following statements is true regarding risk analysis?
(Select two.) | back 73 Annualized Rate of Occurrence (ARO) identifies how often the
successful threat attack will occur in a single year. |
front 74 When would choosing to do nothing about an identified risk be
acceptable? | back 74 When the cost of protecting the asset is greater than the potential loss |
front 75 If an organization shows sufficient due care, which burden is
eliminated in the event of a security breach? | back 75 Negligence |
front 76 You have conducted a risk analysis to protect a key company asset.
You identify the following values: | back 76 Asset value (AV) x exposure factor (EF) x Annualized Rate of Occurrence (ARO) 400 x 75% x .25 = 75 |
front 77 When conducting a risk assessment, how is the Annualized Rate of
Occurrence (ARO) calculated? | back 77 Through historical data provided by insurance companies and crime statistics. |
front 78 Purchasing insurance is what type of response to risk? | back 78 Transference |
front 79 To determine the value of the company assets, an anonymous survey was
used to collect the opinions of all senior and mid-level managers.
Which asset valuation method was used? | back 79 Delphi method |
front 80 You have conducted a risk analysis to protect a key company asset.
You identify the following values: | back 80 The Single Loss Expectancy (SLE) is the asset value (AV) multiplied by the exposure factor (EF), with the EF being a percentage of the asset value that is lost. In this example, SLE 400 x 75% 300. |
front 81 Which type of Data Loss Prevention system is usually installed near
the network perimeter to detect sensitive data that is being
transmitted in violation of organizational security policies? | back 81 Network DLP |
front 82 Which type of data loss prevention system can be configured to block
unauthorized email messages from being sent and, therefore, being
subject to email retention rules? | back 82 Endpoint DLP |
front 83 Which of the following is not an accepted countermeasure to
strengthen a cryptosystem? | back 83 Keep the cryptosystem a secret |
front 84 When recovering from a disaster, which services should you stabilize
first? | back 84 Mission-critical |
front 85 In business continuity planning, what is the primary focus of the
scope? | back 85 Business processes |
front 86 What is the primary goal of business continuity planning? | back 86 Maintaining business operations with reduced or restricted infrastructure capabilities or resources |
front 87 When is a BCP or DRP design and development actually completed? | back 87 Never |
front 88 You are a database administrator and the first responder for database
attacks. You have decided to test one part of your current Business
Continuity Plan (BCP) with two other database professionals. | back 88 Tabletop exercise |
front 89 You have recently been hired as the new network administrator for a
startup company. The company's network was implemented | back 89 Physically secure high-value systems |
front 90 You have hired 10 new temporary workers who will be with the company
for three months. You want to make sure that after that time the user
accounts cannot be used for login. | back 90 Configure account expiration in the user accounts |
front 91 As you go through the process of making your network more manageable,
you discover that employees in the sales department are on the same
network segment as the human resources department. | back 91 Create a separate VLAN for each department |
front 92 What is the primary countermeasure to social engineering? | back 92 Awareness |
front 93 How can an organization help prevent social engineering attacks?
(Select two.) | back 93 Publish and enforce clearly-written security policies. |
front 94 Which of the following attacks tricks victims into providing
confidential information (such as identity information or login
credentials) through emails or websites that impersonate an online
entity that the victim trusts? | back 94 Phishing |
front 95 Which of the following is a common social engineering attack? Distributing hoax virus information emails | back 95 Distributing hoax virus information emails |
front 96 You have just received a generic-looking email that is addressed as
coming from the administrator of your company. | back 96 Verify that the email was sent by the administrator and that this new service is legitimate. |
front 97 Dumpster diving is a low-tech way of gathering information that may
be useful in gaining unauthorized access or as a starting point for
more advanced attacks. How can a company reduce the risk associated
with dumpster diving? | back 97 Establish and enforce a document destruction policy |
front 98 Which of the following are examples of social engineering? (Select
two.) | back 98 Shoulder surfing |
front 99 Which of the following social engineering attacks use Voice over IP (VolP) to gain sensitive information? Tailgating | back 99 Vishing |
front 100 A senior executive reports that she received a suspicious email
concerning a sensitive internal project that is behind production. The
email was sent from someone she doesn't know, and he is asking for
immediate clarification on several of the project's details so the
project can get back on schedule. | back 100 Whaling |
front 101 The receptionist received a phone call from an individual claiming to
be a partner in a high-level project and is requesting sensitive
information. The individual is engaging in which type of social
engineering? | back 101 Authority |
front 102 You've just received an email message explaining that a new and
serious malicious code threat is ravaging across the internet. The
message contains detailed information about the threat, its source
code, and the damage it can inflict. The message states that you can
easily detect whether or not you have already been a victim of this
threat by the presence of three files in the WVindowsXSystem32 folder.
As a countermeasure, the message suggests that you delete these three
files from your system. | back 102 Verify the information on well-known malicious code threat management websites |
front 103 What is the weakest point in an organization's security
infrastructure? | back 103 People |
front 104 Which of the following is not a form of social engineering? | back 104 Impersonating a user by logging on with stolen credentials |
front 105 What is another name for a back door that was accidentally left in a
product by the manufacturer? | back 105 Maintenance hook |
front 106 Which of the following is an action that must take place during the
release stage of the SDLC? | back 106 Vendors develop and release patches in response to exploited vulnerabilities that have been discovered. |
front 107 Which of the following program writing development modes is a method
that allows for optimal control over coherence, security, accuracy,
and comprehensibility? | back 107 Structured programming |
front 108 How often should change control management be implemented? | back 108 Any time a production system is altered. |
front 109 In which phase of the system life cycle is security integrated into
the product? | back 109 Project initiation |
front 110 In which phase of the system life cycle is software testing
performed? (Choose Two) | back 110 Installation |
front 111 What is the primary purpose of imposing software lifecycle management
concepts? | back 111 Increase the quality of software |
front 112 What is the primary purpose of forcing employees to take mandatory
one-week minimum vacations every year? | back 112 To check for evidence of fraud |
front 113 A code of ethics does all but which of the following? | back 113 Clearly defines courses of action to take when a complex issue is encountered |
front 114 Which of the following are typically associated with human resource
security policies? (Select two.) | back 114 Background checks |
front 115 Which of the following is not part of security awareness training?
| back 115 Employee agreement documents |
front 116 Over the last month, you have noticed a significant increase in the occurrence of inappropriate activities performed by employees. What is the best first response step to take in order to improve or maintain the security level of the environment? Terminate all offenders | back 116 Improve and hold new awareness sessions |
front 117 As you help a user with a computer problem, you notice that she has
written her password on a note stuck to her computer monitor. You
check the password policy of your company and find that the following
settings are currently required: | back 117 Implement end-user training |
front 118 You have installed antivirus software on computers at your business.
Within a few days, however, you notice that one computer has a virus.
When you question the user, she says she installed some software a few
days ago, but it was supposed to be a file compression utility. She
admits she did not scan the file before running it. | back 118 User awareness training |
front 119 Which of the following defines two-man control? | back 119 Certain tasks should be dual-custody in nature to prevent a security breach. |
front 120 Which of the following is a legal contract between the organization and the employee that specifies the employee is not to disclose the organization's confidential information? Acceptable use agreement | back 120 Non-disclosure agreement |
front 121 Your company security policy requires separation of duties for all
network security matters. Which of the following scenarios best
describes this concept? | back 121 The system administrator configures remote access privileges and the security officer reviews and activates each account. |
front 122 Which of the following is not a protection against collusion? | back 122 Cross-training |
front 123 Which of the following is not an element of the termination process?
| back 123 Dissolution of the NDA |
front 124 When you inform an employee that they are being terminated, what is
the most important activity? | back 124 Disable their network access |
front 125 The best way to initiate solid administrative control over an organization's employees .s to have what element in place? Mandatory vacations in one-week increments | back 125 Distinct job descriptions |
front 126 A smart phone was lost at the airport. There is no way to recover the
device. Which if the following will ensure data confidentiality on the
device? | back 126 Remote wipe |
front 127 Which of the following are not reasons to remote wipe a mobile
device? | back 127 The device is inactive for a period of time. |
front 128 Which of the following mobile device security considerations disables
the ability to use the device after a short period of inactivity? | back 128 Screen lock |
front 129 Over the last several years, the use of mobile devices within your
organization has increased dramatically. Unfortunately, many
department heads circumvented your information systems procurement
policies and directly purchased tablets and smartphones for their
employees without authorization. As a result, there is a proliferation
of devices within your organization without accountability. You need
to get things under control and begin tracking your organization's
devices. | back 129 Implement a mobile endpoint management (MEM) solution. |
front 130 Your organization has recently purchased 20 tablet devices for the
Human Resource department to use for training sessions. You are
concerned that these devices could represent a security risk to your
network and want to strengthen their security profile as much as
possible. | back 130 Enable device encryption. |
front 131 Your organization entered into an Interoperability Agreement (IA)
with another organization a year ago. As a part of this agreement, a
federated trust was established between your domain and the partner
domain. The partnership has been in the ongoing operations phase for
almost nine months now. | back 131 Verify compliance with the IA documents |
front 132 Your organization is in the process of negotiating an
Interoperability Agreement (IA) with another organization. As a part
of this agreement, the partner organization proposes that a federated
trust be established between your domain and their domain. This
configuration will allow users in their domain to access resources in
your domain and Vice versa. | back 132 Identify how data will be shared. |
front 133 Your company is preparing to enter into a partner relationship with
another organization. It will be necessary for the information systems
used by each organization to connect and integrate with each other. | back 133 Ensure that the integration process maintains the security of each organization's network |
front 134 You are about to enter your office building through a back entrance. A man dressed as a plumber asks you to let him in so he can fix the restroom. What should you do? Let him in and help him find the restroom, then let him work.
| back 134 Direct him to the front entrance and instruct him to check in with the receptionist. |
front 135 Which of the following are solutions that address physical security?
(Select two.) | back 135 Escort visitors at all times |
front 136 Which of the following is not an example of a physical barrier access
control mechanism? | back 136 One-time passwords |
front 137 Which of the following can be used to stop piggybacking at a front
entrance where employees should swipe smart cards to gain entry? | back 137 Deploy a mantrap |
front 138 Which option is a secure doorway that can be used in coordination
with a mantrap to allow easy egress from a secured environment while
actively preventing re-entrance through the exit portal? | back 138 Turnstiles |
front 139 What is the primary benefit of CCTV? | back 139 Expand the area visible by security guards |
front 140 You want to use CCTV to increase your physical security. You want the ability to remotely control the camera position. Which camera type should you choose? | back 140 PTZ |
front 141 You want to use CCTV to increase the physical security of your
building. Which of the following camera types would offer the sharpest
image at the greatest distance under the lowest lighting conditions? | back 141 500 resolution, 50mm, .05 LUX |
front 142 Which of the following CCTV camera types lets you adjust the distance
that the camera can see (in other words, zoom in or out)? | back 142 Varifocal |
front 143 Which of the following allows for easy exit of an area in the event
of an emergency, but prevents entry? (Select two.) | back 143 Double-entry door |
front 144 Which of the following controls is an example of a physical access
control method? | back 144 Locks on doors |
front 145 Which of the following is the most important thing to do to prevent
console access to the router? | back 145 Keep the router in a locked room |
front 146 • When you enter the facility, a receptionist greets you and directs
you down the hallway to the office manager's cubicle. The receptionist
uses a notebook system that is secured to her desk with a cable lock.
| back 146 • Relocate the switch to the locked server closet. Keeping it in a
cubicle could allow an attacker to configure port mirroring on the
switch and capture network traffic. |
front 147 • When you enter the facility, a receptionist greets you and escorts
you through a locked door to the work area, where the office manager
sits. | back 147 Implement a hardware checkout policy. |
front 148 A malicious user in your organization was able to use the Trinity
Rescue Kit to change the password on a department manager's computer
in the finance department. The user was able to copy data containing
bank account information and social security numbers. The user then
destroyed the data by resetting the computer. The department manager
was at lunch at the time and had enabled the lock screen to require a
password to gain access to the computer. | back 148 The computer should have been kept in a physically secure location. |
front 149 An attacker is using an eavesdropping technique called Van Eck
phreaking on a networking closet. | back 149 Collecting electronic emissions |
front 150 Your networking closet contains your network routers, switches,
bridges, and some servers. You want to make sure an attacker is not
able to gain physical access to the equipment in the networking closet
and prevent anyone from reconfiguring the network to set up remote
access or backdoor access. | back 150 Place your networking equipment in a locked cage. |
front 151 One of the ways attackers can access unencrypted data being
transmitted on your network is by collecting electronic em.ssions that
come from your networking closet or Ethernet cables. | back 151 Configure all data transmissions to be encrypted |
front 152 Physical security is an obvious requirement for network security, but
it is often easy to overlook or forget to plan for it. | back 152 Employee passwords are stronger. |
front 153 To keep your data center safe, you have done the following: | back 153 Implement a checkout policy. |
front 154 You walk by the server room and notice that a fire has started. What
should you do first? | back 154 Make sure everyone has cleared the area. |
front 155 Which of the following fire extinguisher types is best used for the
electrical fires that might result when working with computer
components? | back 155 Class C |
front 156 Which of the following fire extinguisher suppressant types is best
used for electrical fires that might result when working with computer
components? | back 156 Carbon dioxide (C02) |
front 157 Which of the following fire extinguisher types poses a safety risk to
users in the area? (Select two.) | back 157 Halon |
front 158 What is the recommended humidity level for server rooms? | back 158 50% |
front 159 Components within your server room are failing at a rapid pace. You discover that the humidity in the server room is at 60% and the temperature is at 80 degrees. What should you do to help reduce problems? Add a de-humidifier to the server room | back 159 Add a separate A/C unit in the server room |
front 160 You maintain the network for an industrial manufacturing company. You
are concerned about the dust in the area getting into server
components and affecting network availability. | back 160 Positive pressure system |
front 161 Which of the following statements about ESD is NOT correct? | back 161 ESD is much more likely to occur when the relative humidity is above 50%. |