QUIZ START
#1. In Active Directory, a security group is:
#2. Which CatTools feature would you use to create a backup of the network switch configuration?
#3. What is a GFS (Grandfather – Father – Son ) backup scheme?
#4. For a controller running in the secure state, what role is played by the ControlST software
#5. How many users can be logged on to one server at one time?
#6. The bridge on the top of the network Spanning Tree is what kind of switch?
#7. Which term below refers to settings that can be applied to computers that join the domain, as well as the enforcement of required configuration settings?
#8. The Security Server (VH1) is?
#9. Load balancing Virtual Machines is a feature that allows VMs to be run on different hosts, which version of OTArmor/SecurityST uses this feature?
#10. Which of the following does NOT describe a benefit of Cisco switches?
#11. To install the monthly patch updates:
#12. If you change a domain policy setting:
#13. What does the DLP (Data Loss Prevention) application do?
#14. When McAfee solidcore is in Observer Mode:
#15. When deploying patches, which of the following is true?
#16. The NIDS device:
#17. If you change a domain policy setting:
#18. Which of the following is the Application Server, containing SolarWinds® CatTools™ and Acronis Backup Management System?
#19. What type of OTArmor/SecurityST configuration is made when you have VH1, VH2 & VH3?
#20. When does the root certificate need to be updated?
#21. Where would you look if you needed to find the Security State for each configured controller?
#22. Which of the following does NOT describe a benefit of Active Directory?
#23. True or False, McAfee Application Control prevents users from accessing applications?
#24. When trying to enter domain credentials in a SecureSuite application, you must press _______________ to open the login dialog for a VM. a. Ctrl + Alt + Delete
#25. What are the default groups the BHGEOper account is a Member Of?
#26. On what Virtual Machine does the McAfee ePO Application reside?
#27. The default settings used for backups limit any one node to use no more than _____ of the available network loading
#28. What is the maximum number of HMIs that a OTArmor/SecurityST Standard be configured for?
#29. What are the BHGE standards IP addresses of VH1,DC1,DC2 and CA1 servers:
#30. From an admin command prompt, what command is used to check the status of the Application Control an HMI or VM?
#31. Which Splunk application would you use to obtain information about failed logons?
#32. When deploying an agent from the McAfee ePO, do you?
#33. The McAfee software has been implemented in this solution because this anti-virus application includes:
#34. The VMWare ESXi host web interface (GUI) is accessed from:
#35. In order for a network switch to verify a user’s access rights, the switch must first:
#36. What problem is associated with retrofit installations and SFPs?
#37. To confirm that individual certificates have been revoked, you must:
#38. Splunk is:
#39. You would use the Splunk FISMA application to:
#40. McAfee uses a ruleset to apply Whitelisting, True or False, is this function applied from the ePO?
#41. In the Cisco FlexStack:
#42. How would you locate in the ePO where the Policy Catalog is?
#43. What is the minimum password length in the password policy?
#44. What happens during a secure socket layer (SSL) handshake?
#45. The CA Server (CA1):
#46. When making a switch configuration change, which command would you use to save the new configuration?
#47. Which of the following virtual machines is considered optional for Compact configurations?
#48. OTArmor/SecurityST uses virtualization technology to minimize security lifecycle costs and provide enhanced recovery capabilities?
#49. If you needed to turn off a port, how would you do so?
#50. If you were going to set up a new user in the Server Manager, you would find the list of GE accounts in which set of folders?
#51. Which of the following is the Backup Domain Controller?
#52. Which of the following provides the real-time analysis of security alerts generated by network hardware and applications, and is used to log security data and generate reports for compliance purposes?
#53. Which level of the standard Network Architecture does the OTArmor/SecurityST system reside on?
#54. Based on the policies BHBHGE has defined, when a potential threat is detected, the McAfee application will:
#55. Controls traffic (i.e., the network traffic to and from our controllers and HMIs) resides on the:
#56. If you needed to change an individual’s assigned role, which dialog would you need to use?
#57. True or False, the High Availability (HA) option includes both hardware and data redundancy for security?
#58. How would an installation of the OTArmor/SecurityST solution at a nuclear power plant differ from a typical installation?
#59. A data diode is designed to pass data:
Previous
Finish



