1. NIST SP800-53 discusses a set of security controls as what type of security tool?
2. Ed has been tasked with identifying a service that will provide a low-latency, highperformance, and high-availability way to host content for his employer. What type of solution should he seek out to ensure that his employer’s customers around the world can access their content quickly, easily, and reliably?
3. Which one of the following is not a function of a forensic disk controller?
4. Mike is building a fault-tolerant server and wishes to implement RAID 1. How many physical disks are required to build this solution?
5. Which Kerberos service generates a new ticket and session keys and sends them to the client?
6. Communication systems that rely on start and stop flags or bits to manage data transmission are known as what type of communication?
7. What type of motion detector uses high microwave frequency signal transmissions to identify potential intruders?
8. Susan sets up a firewall that keeps track of the status of the communication between two systems and allows a remote system to respond to a local system after the local system starts communication. What type of firewall is Susan using?
For questions 9–11, please refer to the following scenario: Ben owns a coffeehouse and wants to provide wireless Internet service for his customers. Ben’s network is simple and uses a single consumer-grade wireless router and a cable modem connected via a commercial cable data contract.
9. How can Ben provide access control for his customers without having to provision user IDs before they connect while also gathering useful contact information for his business purposes?