232 Chapter 10 ■ Practice Test 2
- James is building a disaster recovery plan for his organization and would like to determine
the amount of acceptable data loss after an outage. What variable is James determining?
A. SLA
B. RTO
C. MTD
D. RPO - Fred needs to deploy a network device that can connect his network to other networks
while controlling traffic on his network. What type of device is Fred’s best choice?
A. A switch
B. A bridge
C. A gateway
D. A router - Alex is preparing to solicit bids for a penetration test of his company’s network and sys-
tems. He wants to maximize the effectiveness of the testing rather than the realism of the
test. What type of penetration test should he require in his bidding process?
A. Black box
B. Crystal box
C. Gray box
D. Zero box - Application banner information is typically recorded during what penetration testing phase?
A. Planning
B. Attack
C. Reporting
D. Discovery - What is the default subnet mask for a Class B network?
A. 255.0.0.0
B. 255.255.0.0
C. 255.254.0.0
D. 255.255.255.0 - Jim has been asked to individually identify devices that users are bringing to work as part
of a new BYOD policy. The devices will not be joined to a central management system
like Active Directory, but he still needs to uniquely identify the systems. Which of the follow-
ing options will provide Jim with the best means of reliably identifying each unique device?
A. Record the MAC address of each system.
B. Require users to fill out a form to register each system.