QUIZ START
#1. To confirm that individual certificates have been revoked, you must:
#2. Which of the following does NOT describe a benefit of Cisco switches?
#3. The Security Server (VH1) is?
#4. When McAfee solidcore is in Observer Mode:
#5. Splunk is:
#6. What is the minimum password length in the password policy?
#7. What type of OTArmor/SecurityST configuration is made when you have VH1, VH2 & VH3?
#8. On what Virtual Machine does the McAfee ePO Application reside?
#9. A data diode is designed to pass data:
#10. When deploying patches, which of the following is true?
#11. Which of the following is the Application Server, containing SolarWinds® CatTools™ and Acronis Backup Management System?
#12. Based on the policies BHBHGE has defined, when a potential threat is detected, the McAfee application will:
#13. If you change a domain policy setting:
#14. When making a switch configuration change, which command would you use to save the new configuration?
#15. Which term below refers to settings that can be applied to computers that join the domain, as well as the enforcement of required configuration settings?
#16. When trying to enter domain credentials in a SecureSuite application, you must press _______________ to open the login dialog for a VM. a. Ctrl + Alt + Delete
#17. When does the root certificate need to be updated?
#18. Which level of the standard Network Architecture does the OTArmor/SecurityST system reside on?
#19. If you were going to set up a new user in the Server Manager, you would find the list of GE accounts in which set of folders?
#20. Which of the following is the Backup Domain Controller?
#21. What is the maximum number of HMIs that a OTArmor/SecurityST Standard be configured for?
#22. The bridge on the top of the network Spanning Tree is what kind of switch?
#23. In Active Directory, a security group is:
#24. Load balancing Virtual Machines is a feature that allows VMs to be run on different hosts, which version of OTArmor/SecurityST uses this feature?
#25. Which of the following does NOT describe a benefit of Active Directory?
#26. The CA Server (CA1):
#27. If you needed to change an individual’s assigned role, which dialog would you need to use?
#28. Which CatTools feature would you use to create a backup of the network switch configuration?
#29. In the Cisco FlexStack:
#30. What are the default groups the BHGEOper account is a Member Of?
#31. Which of the following virtual machines is considered optional for Compact configurations?
#32. OTArmor/SecurityST uses virtualization technology to minimize security lifecycle costs and provide enhanced recovery capabilities?
#33. If you change a domain policy setting:
#34. True or False, McAfee Application Control prevents users from accessing applications?
#35. How would an installation of the OTArmor/SecurityST solution at a nuclear power plant differ from a typical installation?
#36. You would use the Splunk FISMA application to:
#37. The default settings used for backups limit any one node to use no more than _____ of the available network loading
#38. From an admin command prompt, what command is used to check the status of the Application Control an HMI or VM?
#39. True or False, the High Availability (HA) option includes both hardware and data redundancy for security?
#40. Controls traffic (i.e., the network traffic to and from our controllers and HMIs) resides on the:
#41. What are the BHGE standards IP addresses of VH1,DC1,DC2 and CA1 servers:
#42. What does the DLP (Data Loss Prevention) application do?
#43. The VMWare ESXi host web interface (GUI) is accessed from:
#44. If you needed to turn off a port, how would you do so?
#45. To install the monthly patch updates:
#46. For a controller running in the secure state, what role is played by the ControlST software
#47. What happens during a secure socket layer (SSL) handshake?
#48. How would you locate in the ePO where the Policy Catalog is?
#49. Where would you look if you needed to find the Security State for each configured controller?
#50. Which of the following provides the real-time analysis of security alerts generated by network hardware and applications, and is used to log security data and generate reports for compliance purposes?
#51. Which Splunk application would you use to obtain information about failed logons?
#52. The NIDS device:
#53. How many users can be logged on to one server at one time?
#54. In order for a network switch to verify a user’s access rights, the switch must first:
#55. The McAfee software has been implemented in this solution because this anti-virus application includes:
#56. When deploying an agent from the McAfee ePO, do you?
#57. McAfee uses a ruleset to apply Whitelisting, True or False, is this function applied from the ePO?
#58. What problem is associated with retrofit installations and SFPs?
#59. What is a GFS (Grandfather – Father – Son ) backup scheme?
Previous
Finish



