Q: Which of the following backup types are most space-efficient? or Q: Which backup type uses the least amount of space among the following? Full backups Differential backups Incremental backups Explanation: Any data that has been modified since the most recent backup, whether it is a full backup or an earlier incremental backup, is the only data that is included in…
-
-
What are good detection measures to incorporate in your organization? Select all that apply.
Q: What are good detection measures to incorporate in your organization? Select all that apply. or Q: Which detection techniques are appropriate for your company to use? Choose every option that pertains. Redundant power supplies Environmental monitoring Backing up firewall rules System performance monitoring Explanation: By subscribing to threat intelligence feeds, you can ensure that you are always up to date…
-
What’s the main purpose of writing a post-mortem?
Q: What’s the main purpose of writing a post-mortem? or Q: What is the primary objective of writing a post-mortem? To assign legal liability To learn from mistakes and how to improve in the future To assign blame for mistakes To scare people into avoiding risky behavior Explanation: The primary objective of doing a post-mortem investigation, which is also known as…
-
What is one aspect of post-mortems that are often overlooked?
Q: What is one aspect of post-mortems that are often overlooked? or Q: Which post-mortem component is most often ignored? What went wrong The summary Timelines What went well Explanation: One component of post-mortem examinations that is sometimes neglected is the significance of accurately recording and appreciating the human aspects and feelings that were present during the occurrence being investigated. The…
-
What is the next step after writing a post-mortem report?
Q: What is the next step after writing a post-mortem report? or Q: After drafting a post-mortem report, what comes next? Share the report with other people on your team and/or other teams Do not disclose the report to anyone Destroy the report Nothing, there are no additional steps after writing the report Explanation: The following phase, which comes after producing…
-
What does the summary section of a post-mortem cover?
Q: What does the summary section of a post-mortem cover? or Q: What topics does a post-mortem’s summary section cover? Description of the incident, how long it lasted, the impact of the incident, and how it was fixed. list of specific actions that should be taken to avoid the same scenario from happening again. Opening catchphrase and witty remarks to…
-
A tech uses the netcat tool on a Linux system. Of the choices, which has proper syntax?
Q: A tech uses the netcat tool on a Linux system. Of the choices, which has proper syntax? or Q: On a Linux system, a technician use the netcat utility. Which option among the options has correct syntax? nc -v 80 nc google.com 80 nc google.com -z nc google.com Explanation: This initiates a TCP connection to the domain name “example.com” on…
-
The unthinkable happens and disaster strikes, crippling your network. You implement your disaster plan, but it doesn’t go smoothly. You decide to investigate. What is a common term in the IT community for this investigation?
Q: The unthinkable happens and disaster strikes, crippling your network. You implement your disaster plan, but it doesn’t go smoothly. You decide to investigate. What is a common term in the IT community for this investigation? or Q: Unimaginable events occur, causing your network to collapse. When you carry out your disaster plan, things don’t go as planned. You make…
-
What does ICMP stand for?
Q: What does ICMP stand for? or Q: How does ICMP represent itself? Internet Control Mail Protocol Internet Control Message Protocol Internet Client Message Protocol Interactive Control Message Protocol Explanation: The abbreviation for “Internet Control Message Protocol” is “ICMP.” It is a network layer protocol that is part of the Internet Protocol (IP) suite, and it is used for the transmission…
-
A Cyclical Redundancy Check (CRC) is an example of what type of built-in protocol mechanism?
Q: A Cyclical Redundancy Check (CRC) is an example of what type of built-in protocol mechanism? or Q: One example of a built-in protocol mechanism is a Cyclical Redundancy Check (CRC). Error detection Error recovery Misconfiguration error Time To Live (TTL) expiration Explanation: Cyclical Redundancy Checks, often known as CRCs, are a specific kind of error-checking technique that is frequently used…