QUIZ START
#1. Which of the following does NOT describe a benefit of Cisco switches?
#2. How many users can be logged on to one server at one time?
#3. When trying to enter domain credentials in a SecureSuite application, you must press _______________ to open the login dialog for a VM. a. Ctrl + Alt + Delete
#4. For a controller running in the secure state, what role is played by the ControlST software
#5. If you change a domain policy setting:
#6. In order for a network switch to verify a user’s access rights, the switch must first:
#7. The Security Server (VH1) is?
#8. From an admin command prompt, what command is used to check the status of the Application Control an HMI or VM?
#9. A data diode is designed to pass data:
#10. Which of the following is the Backup Domain Controller?
#11. When making a switch configuration change, which command would you use to save the new configuration?
#12. To install the monthly patch updates:
#13. Which of the following virtual machines is considered optional for Compact configurations?
#14. What problem is associated with retrofit installations and SFPs?
#15. True or False, McAfee Application Control prevents users from accessing applications?
#16. What type of OTArmor/SecurityST configuration is made when you have VH1, VH2 & VH3?
#17. Controls traffic (i.e., the network traffic to and from our controllers and HMIs) resides on the:
#18. What are the default groups the BHGEOper account is a Member Of?
#19. Which of the following provides the real-time analysis of security alerts generated by network hardware and applications, and is used to log security data and generate reports for compliance purposes?
#20. Which CatTools feature would you use to create a backup of the network switch configuration?
#21. Which term below refers to settings that can be applied to computers that join the domain, as well as the enforcement of required configuration settings?
#22. What is the maximum number of HMIs that a OTArmor/SecurityST Standard be configured for?
#23. When does the root certificate need to be updated?
#24. The bridge on the top of the network Spanning Tree is what kind of switch?
#25. The NIDS device:
#26. True or False, the High Availability (HA) option includes both hardware and data redundancy for security?
#27. The default settings used for backups limit any one node to use no more than _____ of the available network loading
#28. How would you locate in the ePO where the Policy Catalog is?
#29. If you change a domain policy setting:
#30. If you needed to turn off a port, how would you do so?
#31. What happens during a secure socket layer (SSL) handshake?
#32. To confirm that individual certificates have been revoked, you must:
#33. What does the DLP (Data Loss Prevention) application do?
#34. When McAfee solidcore is in Observer Mode:
#35. Which of the following does NOT describe a benefit of Active Directory?
#36. If you needed to change an individual’s assigned role, which dialog would you need to use?
#37. Which Splunk application would you use to obtain information about failed logons?
#38. If you were going to set up a new user in the Server Manager, you would find the list of GE accounts in which set of folders?
#39. The McAfee software has been implemented in this solution because this anti-virus application includes:
#40. What is the minimum password length in the password policy?
#41. What is a GFS (Grandfather – Father – Son ) backup scheme?
#42. You would use the Splunk FISMA application to:
#43. On what Virtual Machine does the McAfee ePO Application reside?
#44. When deploying patches, which of the following is true?
#45. When deploying an agent from the McAfee ePO, do you?
#46. Where would you look if you needed to find the Security State for each configured controller?
#47. In Active Directory, a security group is:
#48. Which level of the standard Network Architecture does the OTArmor/SecurityST system reside on?
#49. What are the BHGE standards IP addresses of VH1,DC1,DC2 and CA1 servers:
#50. Which of the following is the Application Server, containing SolarWinds® CatTools™ and Acronis Backup Management System?
#51. McAfee uses a ruleset to apply Whitelisting, True or False, is this function applied from the ePO?
#52. The CA Server (CA1):
#53. OTArmor/SecurityST uses virtualization technology to minimize security lifecycle costs and provide enhanced recovery capabilities?
#54. Load balancing Virtual Machines is a feature that allows VMs to be run on different hosts, which version of OTArmor/SecurityST uses this feature?
#55. In the Cisco FlexStack:
#56. Splunk is:
#57. Based on the policies BHBHGE has defined, when a potential threat is detected, the McAfee application will:
#58. The VMWare ESXi host web interface (GUI) is accessed from:
#59. How would an installation of the OTArmor/SecurityST solution at a nuclear power plant differ from a typical installation?
Previous
Finish



