CYB3R53C

Cybersecurity Starts Here: Explore, Learn, and Secure Your Operations

OTArmor L1 Test

 
QUIZ START

#1. To confirm that individual certificates have been revoked, you must:

#2. Which of the following does NOT describe a benefit of Cisco switches?

#3. The Security Server (VH1) is?

#4. When McAfee solidcore is in Observer Mode:

#5. Splunk is:

#6. What is the minimum password length in the password policy?

#7. What type of OTArmor/SecurityST configuration is made when you have VH1, VH2 & VH3?

#8. On what Virtual Machine does the McAfee ePO Application reside?

#9. A data diode is designed to pass data:

#10. When deploying patches, which of the following is true?

#11. Which of the following is the Application Server, containing SolarWinds® CatTools™ and Acronis Backup Management System?

#12. Based on the policies BHBHGE has defined, when a potential threat is detected, the McAfee application will:

#13. If you change a domain policy setting:

#14. When making a switch configuration change, which command would you use to save the new configuration?

#15. Which term below refers to settings that can be applied to computers that join the domain, as well as the enforcement of required configuration settings?

#16. When trying to enter domain credentials in a SecureSuite application, you must press _______________ to open the login dialog for a VM. a. Ctrl + Alt + Delete

#17. When does the root certificate need to be updated?

#18. Which level of the standard Network Architecture does the OTArmor/SecurityST system reside on?

#19. If you were going to set up a new user in the Server Manager, you would find the list of GE accounts in which set of folders?

#20. Which of the following is the Backup Domain Controller?

#21. What is the maximum number of HMIs that a OTArmor/SecurityST Standard be configured for?

#22. The bridge on the top of the network Spanning Tree is what kind of switch?

#23. In Active Directory, a security group is:

#24. Load balancing Virtual Machines is a feature that allows VMs to be run on different hosts, which version of OTArmor/SecurityST uses this feature?

#25. Which of the following does NOT describe a benefit of Active Directory?

#26. The CA Server (CA1):

#27. If you needed to change an individual’s assigned role, which dialog would you need to use?

#28. Which CatTools feature would you use to create a backup of the network switch configuration?

#29. In the Cisco FlexStack:

#30. What are the default groups the BHGEOper account is a Member Of?

#31. Which of the following virtual machines is considered optional for Compact configurations?

#32. OTArmor/SecurityST uses virtualization technology to minimize security lifecycle costs and provide enhanced recovery capabilities?

#33. If you change a domain policy setting:

#34. True or False, McAfee Application Control prevents users from accessing applications?

#35. How would an installation of the OTArmor/SecurityST solution at a nuclear power plant differ from a typical installation?

#36. You would use the Splunk FISMA application to:

#37. The default settings used for backups limit any one node to use no more than _____ of the available network loading

#38. From an admin command prompt, what command is used to check the status of the Application Control an HMI or VM?

#39. True or False, the High Availability (HA) option includes both hardware and data redundancy for security?

#40. Controls traffic (i.e., the network traffic to and from our controllers and HMIs) resides on the:

#41. What are the BHGE standards IP addresses of VH1,DC1,DC2 and CA1 servers:

#42. What does the DLP (Data Loss Prevention) application do?

#43. The VMWare ESXi host web interface (GUI) is accessed from:

#44. If you needed to turn off a port, how would you do so?

#45. To install the monthly patch updates:

#46. For a controller running in the secure state, what role is played by the ControlST software

#47. What happens during a secure socket layer (SSL) handshake?

#48. How would you locate in the ePO where the Policy Catalog is?

#49. Where would you look if you needed to find the Security State for each configured controller?

#50. Which of the following provides the real-time analysis of security alerts generated by network hardware and applications, and is used to log security data and generate reports for compliance purposes?

#51. Which Splunk application would you use to obtain information about failed logons?

#52. The NIDS device:

#53. How many users can be logged on to one server at one time?

#54. In order for a network switch to verify a user’s access rights, the switch must first:

#55. The McAfee software has been implemented in this solution because this anti-virus application includes:

#56. When deploying an agent from the McAfee ePO, do you?

#57. McAfee uses a ruleset to apply Whitelisting, True or False, is this function applied from the ePO?

#58. What problem is associated with retrofit installations and SFPs?

#59. What is a GFS (Grandfather – Father – Son ) backup scheme?

Previous
Finish

Results

Congratulation you pass the exam!!!

Sorry, it is time to review concepts and try again