
QUIZ START
#1. The VMWare ESXi host web interface (GUI) is accessed from:
#2. On what Virtual Machine does the McAfee ePO Application reside?
#3. Which of the following is the Application Server, containing SolarWinds® CatTools™ and Acronis Backup Management System?
#4. What is the minimum password length in the password policy?
#5. To install the monthly patch updates:
#6. When trying to enter domain credentials in a SecureSuite application, you must press _______________ to open the login dialog for a VM. a. Ctrl + Alt + Delete
#7. McAfee uses a ruleset to apply Whitelisting, True or False, is this function applied from the ePO?
#8. The CA Server (CA1):
#9. In Active Directory, a security group is:
#10. What happens during a secure socket layer (SSL) handshake?
#11. Based on the policies BHBHGE has defined, when a potential threat is detected, the McAfee application will:
#12. How would an installation of the OTArmor/SecurityST solution at a nuclear power plant differ from a typical installation?
#13. What are the BHGE standards IP addresses of VH1,DC1,DC2 and CA1 servers:
#14. The default settings used for backups limit any one node to use no more than _____ of the available network loading
#15. Which level of the standard Network Architecture does the OTArmor/SecurityST system reside on?
#16. Where would you look if you needed to find the Security State for each configured controller?
#17. Which of the following does NOT describe a benefit of Cisco switches?
#18. To confirm that individual certificates have been revoked, you must:
#19. The McAfee software has been implemented in this solution because this anti-virus application includes:
#20. Which of the following virtual machines is considered optional for Compact configurations?
#21. In order for a network switch to verify a user’s access rights, the switch must first:
#22. The NIDS device:
#23. When deploying patches, which of the following is true?
#24. What are the default groups the BHGEOper account is a Member Of?
#25. True or False, the High Availability (HA) option includes both hardware and data redundancy for security?
#26. A data diode is designed to pass data:
#27. Which Splunk application would you use to obtain information about failed logons?
#28. Which of the following provides the real-time analysis of security alerts generated by network hardware and applications, and is used to log security data and generate reports for compliance purposes?
#29. When does the root certificate need to be updated?
#30. OTArmor/SecurityST uses virtualization technology to minimize security lifecycle costs and provide enhanced recovery capabilities?
#31. If you change a domain policy setting:
#32. Splunk is:
#33. When McAfee solidcore is in Observer Mode:
#34. The bridge on the top of the network Spanning Tree is what kind of switch?
#35. In the Cisco FlexStack:
#36. True or False, McAfee Application Control prevents users from accessing applications?
#37. What problem is associated with retrofit installations and SFPs?
#38. From an admin command prompt, what command is used to check the status of the Application Control an HMI or VM?
#39. What is a GFS (Grandfather – Father – Son ) backup scheme?
#40. What does the DLP (Data Loss Prevention) application do?
#41. Controls traffic (i.e., the network traffic to and from our controllers and HMIs) resides on the:
#42. Which term below refers to settings that can be applied to computers that join the domain, as well as the enforcement of required configuration settings?
#43. The Security Server (VH1) is?
#44. If you needed to change an individual’s assigned role, which dialog would you need to use?
#45. If you needed to turn off a port, how would you do so?
#46. If you change a domain policy setting:
#47. How many users can be logged on to one server at one time?
#48. When deploying an agent from the McAfee ePO, do you?
#49. For a controller running in the secure state, what role is played by the ControlST software
#50. How would you locate in the ePO where the Policy Catalog is?
#51. What is the maximum number of HMIs that a OTArmor/SecurityST Standard be configured for?
#52. Which CatTools feature would you use to create a backup of the network switch configuration?
#53. You would use the Splunk FISMA application to:
#54. Which of the following is the Backup Domain Controller?
#55. When making a switch configuration change, which command would you use to save the new configuration?
#56. If you were going to set up a new user in the Server Manager, you would find the list of GE accounts in which set of folders?
#57. Load balancing Virtual Machines is a feature that allows VMs to be run on different hosts, which version of OTArmor/SecurityST uses this feature?
#58. What type of OTArmor/SecurityST configuration is made when you have VH1, VH2 & VH3?
#59. Which of the following does NOT describe a benefit of Active Directory?
Previous
Finish