214 Chapter 9 ■ Practice Test 1
- What penetration testing technique can best help assess training and awareness issues?
A. Port scanning
B. Discovery
C. Social engineering
D. Vulnerability scanning - Bill implemented RAID level 5 on a server that he operates using a total of three disks.
How many disks may fail without the loss of data?
A. 0
B. 1
C. 2
D. 3 - Data is sent as bits at what layer of the OSI model?
A. Transport
B. Network
C. Data Link
D. Physical - Bert is considering the use of an infrastructure as a service cloud computing partner to
provide virtual servers. Which one of the following would be a vendor responsibility in
this scenario?
A. Maintaining the hypervisor
B. Managing operating system security settings
C. Maintaining the host firewall
D. Configuring server access control - When Ben records data and then replays it against his test website to verify how it per-
forms based on a real production workload, what type of performance monitoring is he
undertaking?
A. Passive
B. Proactive
C. Reactive
D. Replay - What technology ensures that an operating system allocates separate memory spaces used
by each application on a system?
A. Abstraction
B. Layering
C. Data hiding
D. Process isolation