Network and Security C172

¡Supera tus tareas y exámenes ahora con Quizwiz!

Which of the answers listed below refers to a data link layer device designed to forward frames between network segments? a) Switch b) Hub c) Router d) Firewall

a

Which of the following answers refer to the OSI network layer components? a) IP Address, Packet, Router b) Network switch, MAC Address, Ethernet Frame c) Hub, Network cabling, TCP/UDO Protocols d) Network cabling, Router, Network switch

a

Which of the following answers refers to a command-line packet capturing utility? a) tcpdump b) netstat c) traceroute d) nmap

a

Which of the following devices passes data based on MAC addresses? a) switch b) router c) hub d) modem

a

Supports 16 Mbps for up to 100 meters and is not commonly used today. a) Cat4 b) Cat5 c) Cat5e d) Cat3

a- Cat4

Attack that exploits previously unknown vulnerabilities, so victims have no time to prepare for or defend against the attack. a) zero-day attack b) brute force attack c) honeypot d) smurf attack

a

Attempts to compromise the security, to see if their security can withstand an attack. In order to find vulnerabilities. a) red team b) grey team c) blue team d) purple team

a

Attempts to compromise the security. a) red team b) blue team c) purple team d) green team

a

Brian would like to secure his website. Which one of the following protocols is the best choice for encrypting communication between a website and its users? a) TLS b) AES c) SSL d) IAM

a

Used for Windows systems a) tracert b) traceroute

a- tracert

Which of the following topologies connects all devices to a single cable? a) Ring b) Bus c) Mesh d) Star

b

As opposed to the simple Denial of Service (DoS) attacks that usually are performed from a single system, a Distributed Denial of Service (DDoS) attack uses multiple compromised computer systems to perform the attack against its target. True or False?

True

A group of people who may or may not be IT professionals and may or may not choose to break laws in pursuit of their hacking goals. a) Gray hat hackers b) White hat hackers c) Black hat hackers d) Script Kiddies

a

A person, device, location, or information that SecOps aims to protect from attack. a) Asset b) Attack c) Vulnerability d) Threat

a

Much like the SQL injection attack, this attack is made possible by applications that do not properly validate user input for extraneous content. In this case, the attacker purposefully enters text that is too large to fit within a region of memory . a) Buffer Overflow b) Port Scanning c) Smurf attack d) Honeypot

a

Network Layer device, makes it's forwarding decisions based on logical network addresses. a) Router b) Switch c) Modem d) Bridge

a

Operates at the Network and Transport of the OSI network model: network and transport. These firewalls inspect incoming (ingress) and outgoing (egress) traffic and compare the following attributes to a database of packet filter rules that determine if the firewall will forward (allow) or drop (deny) the traffic: a) Packet Filter Firewalls b) Firewall c) Stateful Inspection d) Application Level

a

Physical Layer device takes the data packets from the router, and sends them to all the devices connected on the network. a) Hub b) Switch c) Modem d) Repeater

a

Require users to log in and will verify their identity using a token. a) Cloud applications b) Hybrid Cloud c) Public Cloud d) Private Cloud

a

Suspicious traffic comes in. An intrusion system blocks suspicious packets before it gets to the switch. a) IPS Deployment b) IDS Deployment c) TCP Deployment d) both a and b

a

The ip command in Linux is the preferred replacement for: a) ifconfig b) ipconfig c) nslookup d) finger

a

They deny someone access to a service, usually by overwhelming the victim with enormous amounts of useless traffic. a) Denial-of-Service (DoS) b) Port Scanning c) Buffer Overflow d) ARP poisoning

a

Which cloud service provides hardware, operating systems, and web servers but not end-user applications? a) PaaS b) IaaS c) SaaS d) Client-Server

a

Is also used in Ethernet LANs and data centers. Is made up of four tightly woven twisted pairs (more twists per linear foot) and supports 1 Gbps for up to 100 meters or 10 Gbps for up to 55 meters. a) Cat6 b) Cat5 c) Cat5e d) Cat6a

a- Cat6

Analog cables made of copper but specifically engineered with a metal shield intended to block signal interference. a) Coaxial b) STP c) Fiber d) UTP Cables

a- Coaxial cables

___________encryption is needed uses SSL/TLS (Secure Sockets Layer, replaced by Transport Layer Security). a) FTPS b) TFTP c) telnet/ssh d) SSH

a- File Transfer Protocol Secure (FTPS)

A platform on which to deploy your application or you simply need a database without the hassle of managing the server the cloud provider is responsible for the virtual servers and, in some cases, the services that run on top of them, such as a database engine, and provides you with a platform on which you can run your code or store your data. a) PaaS b) Client-Server c) SaaS d) IaaS

a- PaaS, Platform as as Service

One example of a _________ offering is basic web hosting, a service that has been around since the dawn of the web. Web hosting, like all ________ offerings, is a partially managed service. a) PaaS b) IaaS c) SaaS d) Client-Server

a- PaaS, Platform as as Service

Commonly used in firewalls to allow private IP address ranges to communicate on the internet. a) PAT & NAT b) BGP & TCP c) SSH & TCL d) BRG & IPS

a- Packet & Network Address Translation

RPC a) Remote Procedure Call b) Registered Process Call c) Remote Protection Cell d) Return Procedure Call

a- Remote Procedure Calls (RPCs) are a generic framework for clients to execute procedures on servers and have the result returned if there is one.

The potential of a threat to exploit a vulnerability via an attack. a) Risk b) Asset c) Vulnerability d) Threat

a- Risk

A point of connection between two or more networks that forwards data packets between the networks. a) Router b) Switch c) Modem d) Bridge

a- Router

This layer of the OSI model provides services to the application layer and receives services from the network layer. It is responsible for the reliable delivery of data. It segments and reassembles data in the correct order for it to be sent to the receiving device. It may also handle the reliable delivery of data and any retries of data that are lost or corrupted (for example, TCP does this). This layer is often called the heart of OSI. a) Transport Layer b) Application Layer c) Network Layer d) Network Interface Layer

a- Transport Layer

This layer of the TCP/IP model is responsible for the end-to-end transport of data. The protocols that live in this layer are transmission control protocol (TCP) and user datagram protocol (UDP). a) Transport Layer b) Data Link Layer c) Network Layer d) Network Interface Layer

a- Transport Layer

Creates a secure channel over the internet between a client computer and a server by exchanging a public key in the form of a certificate. a) TLS b) MFA c) SSL d) IAM

a- Transport Layer Security

Displays information about active ports and their state and can be useful in troubleshooting and capacity management. It is available in Windows, MacOS, and Linux. a) netstat b) ARP c) nslookup d) dig

a- netstat, network statistics

A company is concerned with traffic that flows through the network. There is a concern that there may be malware that exists that is not being blocked or eradicated by antivirus. What technology can be put in place to detect potential malware traffic on the network? a) IPS b) IDS c) TCP d) Firewall

b

A group of people who may or may not be IT professionals and may or may not choose to break laws in pursuit of their hacking goals. a) black hat hackers b) grey hat hackers c) white hat hackers d) red had hackers

b

An action taken by a threat that exploits a vulnerability that attempts to either block authorized access to an asset, or to gain unauthorized access to an asset. a) Asset b) Attack c) Vulnerability d) Threat

b

An attacker plans to exploit flaws in an operating system to gain access to a user's computer system. What is a prevention mechanism for this type of attack? a) Firewall b) Patching c) Antivirus d) VPN

b

An attacker sets up an illegitimate wireless network using their own WAP and may even share their own cellular data to create an internet hotspot. a) Ad-hoc b) Fake Access c) Wiretapping d) Deauth Attack

b

Attack that exploits previously unknown vulnerabilities, so victims have no time to prepare for or defend against the attack. a) brute force attack b) zero-day attack c) Smurf attack d) Honeypot

b

Can systematically check each of these ports by sending thousands of TCP/IP packets to the victim's computer, each packet on a different TCP port. a) Wiretapping b) Port Scanning c) Buffer Overflow d) ARP poisoning

b

Data Link Layer device used to connect devices in a specific network and allows them to communicate efficiently within the network. a) Router b) Switch c) Modem d) Bridge

b

Security Mitigation: Fiber optic cable, locks, security personnel. a) Data Link layer b) Physical Layer c) Transport Layer d) Network Layer

b

Security Mitigation: Regular OS and application patching a) Data Link layer b) Session Layer c) Transport Layer d) Network Layer

b

Suspicious traffic comes into the switch Intrusion system inspects traffic and alerts admin of suspicious packets. An alarm is sent to admin's management system. a) IPS Deployment b) IDS Deployment c) TCP Deployment d) both a and b

b

The abbreviation for IT security operations; a discipline within IT responsible for protecting assets by reducing the risk of attacks. a) SIT b) SecOps c) ITOps d) OpSec

b

Which software provides malware protection a) Personal firewall b) Antivirus c) Encryption d) Content filler

b

Which cloud service model requires the customer to be responsible for operating systems? a) PaaS b) IaaS c) SaaS d) Client-Server

b- IaaS

Which layers of the OSI model does a packet-filtering firewall operate in? a) Physical & Data Link b) Network & Transport c) Transport & Session d) Presentation & Application

b- In order for a firewall to filter packets, it must be able to analyze the address (Network Layer) as well as the type of traffic—usually TCP or UDP—which requires Transport Layer inspection.

Which three levels of the OSI model does stateful inspection require? a) Physical, Data Link, Network b) Network, Transport, Session c) Data Link, Transport, Application d) Network, Session, Application

b- In order for a firewall to understand whether there is a conversation going on between two endpoints, it must be able to analyze the address (Network Layer), it must be able to analyze the type of traffic—usually TCP or UDP—which requires Transport Layer inspection, and it must be able to analyze Session Layer data in order to recognize that a session has been requested and established.

Monitors the network to detect threats. Listens passively on the network. Alerts network admin of any detected suspicious behavior. a) IPS b) IDS c) TCP d) both a and b

b- Intrusion Detection System

An extra step beyond a username and password a) TLS b) MFA c) SSL d) IAM

b- Multi-factor authentication

Transfers a file from either a client to a server or from a server to a client using UDP (user datagram protocol) instead of TCP, and so it is usually used on reliable (local) networks. a) FTPS b) TFTP c) telnet/ssh d) SSH

b- Trivial File Transfer Protocol (TFTP)

Called bare- metal hypervisors. a) KVM b) Type 1 Hypervisor c) VM d) Type 2 Hypervisor

b- Type 1 Hypervisors

Where does the switch or the ethernet switch, sit on the data model? a) 1st layer b) 2nd layer c) 3rd layer d) 4th layer

b- data link layer

Used for Linux systems a) tracert b) traceroute

b- traceroute

Automatically creates rules to permit traffic based on communication type. Operates at OSI Network, Transport and Session layers. a) Packet Filter Firewalls b) Firewall c) Stateful Inspection d) Application Level

c

Port scanner happens on this OSI layer. a) Data Link layer b) Session Layer c) Transport Layer d) Network Layer

c

Responsible for scanning servers and network devices for known weaknesses. There are a variety of scanning tools on the market. Some are open source, such as Nessus, whereas most are commercial products. a) Virus testers b) Attack testers c) Vulnerability Testers d) Script Kiddies

c

Security Mitigation: Application layer proxy or IPS. Training users on fake credentials a) Data Link layer b) Physical Layer c) Presentation Layer d) Network Layer

c

Security Mitigation: Packet filtering firewall a) Data Link layer b) Physical Layer c) Transport Layer d) Network Layer

c

Which IEEE 802 standard is for wireless LAN connections? a) 802.3 b) 802.15 c) 802.11 d) 802.1x

c

Which of the following attacks relies on altering the source Network Layer address? a) IP attack b) IP poisoning c) IP spoofing d) VLAN hopping

c

Which of the following devices forwards data packets to all connected ports? a) switch b) router c) hub d) access point

c

This layer of the TCP/IP model defines the logical transmission protocols for the whole network. The main protocols that live in this layer are internet protocol (IP), internet control message protocol (ICMP), and address resolution protocol (ARP). a) Transport Layer b) Data Link Layer c) Network Layer d) Network Interface Layer

c- Network Layer

Which model consists of an application layer, a presentation layer, a session layer, a transport layer, a network layer, a data link layer, and a physical layer. a) FTP b) TCP/IP c) OSI d) ISO

c- OSI, Open System Interconnection model

This layer of the OSI model is responsible for the physical connections of the devices in the network. This layer is implemented through the use of devices such as hubs, repeaters, modem devices, and physical cabling. a) Transport Layer b) Data Link Layer c) Physical Layer d) Network Interface Layer

c- Physical Layer

This is an end connector typically used with Ethernet cables and supports four pairs (eight wires). a) Cat6 b) Ethernet c) RJ45 d) RJ11

c- RJ45

Cloud application service, Software is licensed to customers with subscription and central hosting. Ex. Subscribing to software, Office 365 a) PaaS b) IaaS c) SaaS d) Client-Server

c- SaaS, Software as a Service

Was designed as a short-term bridge between the original WEP standard and the more secure IEEE 802.11i standard, which was finalized in 2004 (now known as WPA2). a) WPA3 b) WPA2 c) WPA d) WEP

c- Wi-Fi protected access

CAN a) capped area network b) continuous area network c) campus area network d) college area network

c- campus area network,

MAN a) many area network b) mega area network c) metropolitan area network d) master area network

c- metropolitan area network

nslookup a) number string lookup b) no server lookup c) name server lookup d) name string lookup

c- name server lookup

netstat a) net statue b) network state attack c) network statistics d) nettable statement

c- network statistics

Displays information for displaying DNS information and troubleshooting DNS problems. It is useful in displaying names to IP address mappings. a) netstat b) ARP c) nslookup d) dig

c- nslookup, name server lookup. The domain name system (DNS) is a naming database in which internet domain names are located and translated into Internet Protocol (IP) addresses. The domain name system maps the name people use to locate a website to the IP address that a computer uses to locate that website.

TCP functions at which layer of the OSI model? a) Data Link layer b) Physical Layer c) Transport Layer d) Star Layer

c- the 4th layer

Can be useful in determining where a ping fails, troubleshooting performance issues, and other aspects regarding connectivity. a) ipconfig b) tracepath c) traceroute/tracert d) ping

c- traceroute/tracert

Used to trace the route an IP packet takes to a destination. It displays each hop (next router) in a numerical list with the hop's IP address and the time it takes to receive the packet a) ipconfig b) tracepath c) traceroute/tracert d) ping

c- traceroute/tracert

A Physical Layer device that strengthens, replicates, or regenerates signals that are weakened during transmission. a) Router b) Switch c) Modem d) Repeater

d

A denial-of-service (DoS) attack where the attacker can force any client (or even every client) off of the network. a) Ad-hoc b) Fake Access c) Wiretapping d) Deauth Attack

d

A server or device that is configured to look very authentic, potentially containing data that appears to be legitimate user data, or configuration files that seem authentic. Sometimes known as a "tar pit". a) Social Engineering b) Spoofing c) Smurf attack d) Honeypot

d

A switch forwards data only to the port that are connected to the destination device. It knows which port to forward it to based on which value? a) Conf value b) IP address c) Port Number d) MAC Address

d

An attacker managed to associate his/her MAC address with the IP address of the default gateway. In result, a targeted host is sending network traffic to the attacker's IP address instead of the IP address of the default gateway. Based on the given info, which type of attack is taking place in this scenario? a) Smurf Attack b) DNS poisoning c) Replay attack d) ARP Poisoning

d

An unauthorized third-party has gained access to a company network. How can they be prevented from deleting data? a) Physical controls b) Biometrics c) Man trap d) Access Controls

d

Confirm user is who they claim to be , Usernames and passwords Public key infrastructure (PKI) certificates a) Interpreting b) Accounting c) Authorization d) Authentication

d

Data Link Layer device similar to a router in that it connects two or more networks, but it simply forwards the data to the next network without analysis. a) Router b) Switch c) Modem d) Bridge

d

HTTP functions at which layer of the OSI model? a) Data Link layer b) Physical Layer c) Transport Layer d) Application Layer

d

Ping flood DoS, Spoofing happens on this OSI layer. a) Data Link layer b) Session Layer c) Transport Layer d) Network Layer

d

Rely on two different keys to encrypt and decrypt the traffic. This is particularly useful on the internet where the encryption of the data being sent to and from e-commerce and banking websites is needed. a) Transport Layer Security b) Secure Sockets Layer c) Symmetric Key Encryption d) Asymmetric Key Encryption

d

Something or someone that can exploit a vulnerability to attack an asset. a) Risk b) Attack c) Vulnerability d) Threat

d

Start & stop session, session maintenance, and authentication. a) Data Link layer b) Presentation Layer c) Transport Layer d) Session Layer

d

TCP or UDP is used. Source and Destination port is added to data. Is an example of which layer of the OSI model? a) Presentation Layer b) Session Layer c) Network Layer d) Transport Layer

d

This layer is responsible for the transmission of data between hosts in different networks as well as routing of data packets. a) Data Link layer b) Presentation Layer c) Transport Layer d) Network Layer

d

Tom would like to determine what network ports are open on a newly commissioned server. Which one of the following tools is best suited for that task? a) finger b) scp c) nslookup d) nmap

d

What is one disadvantage of using WPA3 on a wireless network? a) The licensing fees can be costly on large networks. b) Security levels are higher using WEP. c) Transmission rates are higher using WEP2. d) WPA3 may not be supported by many older network devices.

d

Which network topology is being implemented when each node connects to exactly two other nodes, forming a single continuous pathway for signals through each node? a) Bus topology b) Star topology c) Mesh topology d) Ring topology

d

Which of the answers listed below refer to the RJ11 connector? a) Coaxial cabling connector, Used with telephone cabling b) Used with Ethernet network cabling, Fiber-optic cabling connector c) Twisted-pair copper cabling connector, Used with Ethernet network cabling d) Used with telephone cabling, Twisted-pair copper cabling connector

d

Is an improvement of the Cat6 standard, supporting the same standards and lengths (with the ability to run 10 Gbps over 100 meters maximum), but using a higher quality cable that is more resistant to interference. This is most commonly used in wired networks today. a) Cat6 b) Cat5 c) Cat5e d) Cat6a

d- Cat6a

A computer network style where either the client makes a request or a server satisfies clients requests. Ex. Printer server is the server and the machine is the client requesting printed documents. Connected with a switch. a) PaaS b) Peer-To-Peer c) SaaS d) Client-Server

d- Client-Server

In a ____________ network model, there is a distinct server and a distinct client. The server is the system that stores data and information. The client is the machine that needs access to that data. This is the traditional model of networking since the 1990s. a) Client-Network b) Server-Network c) Peer-To-Peer d) Client-Server

d- Client-Server

Was part of the first wireless standards proposed by the IEEE in 1997. As the name suggests, the idea was to provide the same level of security as a wired network for wireless networks. a) WPA3 b) WPA2 c) WPA d) WEP

d- Wired equivalent privacy

SAN a) system area network b) stable area network c) secure actual network d) storage area network

d- storage area network

A security analyst is testing the security of an organization's website by placing a script directly into a search box. Which of the OSI model is the analyst addressing? a) Transport b) Network c) Session d) Application

d- the analyst in this scenario is testing for cross-site scripting vulnerabilities, which would affect the application layer.

Mac address of router and source mac address of host is added to data. Is an example of which layer of the OSI model? a) Data Link Layer b) Physical Layer c) Network Layer d) Transport Layer

a

This layer is responsible for connection establishment, session maintenance, and authentication. a) Session Layer b) Application Layer c) Network Layer d) Presentation Layer

a- Session Layer

A Linux command-line utility for displaying intermediary points (routers) the IPv4 packet is passed through on its way to another network node is known as: a) tracert b) netstat c) traceroute d) finger

c

A device designed to filter and transfer data packets between dissimilar types of computer networks is called: a) Switch b) Hub c) Router d) Firewall

c

A malicious user was able to lock a user's account after guessing the user's password multiple times unsuccessfully. Which category of the CIA triad did the malicious user target in this attack? a) Confidentiality b) Integrity c) Availability d) Authority

c

A method attackers use to cause an Ethernet switch to flood all traffic to every port on the switch, including the attacker's computer. a) Buffer Overflow b) Ping flood attack c) ARP poisoning d) Denial-of-Service (DoS)

c

A server or device that is configured to look very authentic, potentially containing data that appears to be legitimate user data, or configuration files that seem authentic. Sometimes known as a "tar pit" a) spoofing b) wiretapping c) honeypot d) smurf attack

c

A technique to gain personal information for the purpose of identity theft, usually by means of fraudulent e-mail a) Denial-of-Service (DoS) b) ping flood attack c) Phishing d) ARP poisoning

c

A weakness in software, hardware, facilities, or humans that can be exploited by a threat. a) Risk b) Attack c) Vulnerability d) Threat

c

Is to prevent an unauthorized user from accessing, copying, or transmitting the information. Part of the CIA triad. a) Confidentiality b) Integrity c) Availability d) Authority

a

A network command-line utility in MS Windows that tracks and displays the route taken by IPv4 packets on their way to another host is called: a) tracert b) netstat c) traceroute d) finger

a

A technique to gain personal information for the purpose of identity theft, usually by means of fraudulent e-mail. a) Phishing b) Ping flood attack c) ARP poisoning d) Denial-of-Service (DoS)

a

Alice would like to send a message to Bob using an asymmetric cryptography algorithm. What key should she use to encrypt the message? a) Bob's public key b) Bob's private key c) Alice's private key d) Alice's public key

a

All wireless communication is performed in a peer-to-peer fashion and does not require or involve a WAP. a) Ad-hoc b) Fake Access c) Wiretapping d) Deauth Attack

a

An MAC address is also referred to as a ___________. a) Physical address b) Universal address c) Logical address d) Internet address

a

Data is formatted in a way receiving app understands (ASCII). Is an example of which layer of the OSI model? a) Presentation Layer b) Application Layer c) Network Layer d) Transport Layer

a

DoS attacks / deauth, ARP poisoning, VLAN hopping happens on this OSI layer. a) Data Link layer b) Session Layer c) Transport Layer d) Network Layer

a

Filters internet content and performs security checks on sites visited, files downloaded, etc. a) web proxy b) brute force attack c) honeypot d) smurf attack

a

In computer networking, a computer system or application that acts as an intermediary between another computer and the Internet is commonly referred to as: a) Proxy b) Server c) Hub d) Bridge

a

May or may not be IT professionals but possess the knowledge and will to breach systems for profit. That profit may be monetary, street credibility, or just a source of entertainment. a) black hat hackers b) grey hat hackers c) white hat hackers d) red had hackers

a

Responsible for scanning servers and network devices for known vulnerabilities. There are a variety of vulnerability scanning tools on the market. Some are open source, such as Nessus, whereas most are commercial products. a) Vulnerability Testers b) White hat hackers c) Black hat hackers d) Script Kiddies

a

Security Mitigation: Use WPA2 or WPA3 security, IPS, Don't use trunk ports. a) Data Link layer b) Physical Layer c) Transport Layer d) Network Layer

a

The password cracker tries every possible combination of characters. a) brute force attack b) zero-day attack c) Smurf attack d) Honeypot

a

The potential of a threat to exploit a vulnerability via an attack. a) Risk b) Attack c) Vulnerability d) Threat

a

The provider gives you limited control over a web server that they maintain for you. You have the ability to log in and upload your code, but they maintain the server for you, including the virtual hardware, guest OS, web services, and the patching for the OS and web services. a) PaaS b) IaaS c) SaaS d) Client-Server

a

The server unknowingly exchanges information with the attacker, believing they are the client, then the attacker forwards the information to the client so nobody notices a break in connection. a) spoofing b) wiretapping c) honeypot d) smurf attack

a

This form of attack can also include putting special ___________ in-line with a computer's network cable and then using a device called a "packet sniffer" to listen and record the traffic on the network. Alternatively, the attacker may put the ________ in the wall behind a network jack. a) Wiretap(ping) b) Spoofing c) Smurf attack d) Honeypot

a

This form of attack can also include putting special wiretaps in-line with a computer's network cable and then using a device called a "packet sniffer" to listen and record the traffic on the network. Alternatively, the attacker may put the wiretap in the wall behind a network jack. a) Wiretapping b) Port Scanning c) Buffer Overflow d) ARP poisoning

a

This form of attack can include putting special taps in-line with a computer's network cable and then using a packet sniffer to listen and record the traffic on the network. a) Wiretapping b) Spoofing c) Smurf attack d) Honeypot

a

This is a man-in-the-middle attack where the attacker impersonates the sender and receiver of the traffic. a) spoofing b) wiretapping c) honeypot d) smurf attack

a

This is the act of manipulating human trust to gain access or information. Examples include impersonation and phishing. a) Social Engineering b) Poor Physical Security Measures c) Social Manipulation d) Smurf Attack

a

This is the act of manipulating human trust to gain access or information. Examples include impersonation and phishing. a) Social Engineering b) Spoofing c) Smurf attack d) Honeypot

a

This layer is responsible for the error-free delivery of data to the receiving device or node. a) Data Link layer b) Presentation Layer c) Transport Layer d) Network Layer

a

To prevent an unauthorized user from accessing, copying, or transmitting the information. a) Confidentiality b) Availability c) Accuracy d) Integrity

a

Was released in January 2018 to address the weaknesses of WPA2. Specifically, it increases the minimum key strength to 192-bits for enterprise mode connections, which are often used in organizations instead of the alternate personal mode available in WPA standards. a) WPA3 b) WPA2.1 c) WPA+ d) WPAPRO

a

What is the name of a Linux command-line utility that can be used to display TCP/IP configuration settings? a) ifconfig b) ipconfig c) nslookup d) finger

a

What is the name of a network layer protocol that specifies the format of packets and addressing scheme in network communications? a) IP b) UDP c) TCP d) NetBIOS

a

Which device provides web content filtering and URL scanning? a) Web Proxy b) Router c) Intrusion detection d) Stateful firewall

a

Which feature of a firewall allows an organization to use private non-routable networks while enabling communication to the internet? a) Port Address Translation (PAT) b) Border Gateway Protocol (BGP) c) Packet filtering d) Stateful inspection

a

A discipline within IT responsible for protecting assets by reducing the risk of attacks. a) SecOps b) Asset c) Vulnerability d) Threat

a- SecOps, IT security operations

Which of the following answers describe the features of a network bridge? a) Makes forwarding decisions in software, Typically capable of connecting fewer network segments than switch (fewer physical ports), Older and less effective type of network device in comparison to network switch b) Makes forwarding decisions in hardware (ASIC), Typically capable of connecting more network segments than switch (more physical ports), Older and less effective type of network device in comparison to network switch c) Newer and more effective type of network device in comparison to network switch, Typically capable of connecting more network segments than switch (more physical ports), Makes forwarding decisions in software d) Makes forwarding decisions in hardware (ASIC), Newer and more effective type of network device in comparison to network switch, Typically capable of connecting fewer network segments than switch (fewer physical ports)

a

Which two layers of the OSI model are the same as the Network Interface layer of the TCP/IP model? a) Physical and Data Link b) Application and Network c) Network and Presentation d) Transport and Data Link

a

Which type of fiber cable is normally used to connect two buildings that are several miles apart? a) Single-mode b) Multimode c) Fiber d) UTP Cables

a

dig a) domain information groper b) digital information grouper c) domain integrity group d) digital Intelligence groper

a

The NIC functions at which layer of the OSI model? a) Data Link layer b) Physical Layer c) Transport Layer d) Star Layer

a - A network interface card (NIC) is a hardware component, typically a circuit board or chip, which is installed on a computer so it can connect to a network. It functions on the Data Link Layer, but operates on the physical layer.

This layer of OSI establishes the connection between your laptop and WGU's server and maintains it while you accomplish your tasks on the website. a) Session b) Transport c) Application d) Presentation

a- Session

ARP a) Address Resolution Protocol b) Article Retrieve Procedure c) Address Recall Protocol d) Analog Rectory Path

a- Address Resolution Protocol

Are mostly used by cable TV companies to connect their customers to the company's facilities. a) Coaxial b) STP c) Fiber d) UTP Cables

a- Coaxial cables

Intercepts and blocks threats. Has many network ports to operate as input/output pairs. Has cables routed physically through devices to create choke points. a) IPS b) IDS c) TCP d) both a and b

a- Intrusion Prevention System

Security solution: Configure the VLAN tagging per the switch vendor's recommendation. a) VLAN Hopping b) Wiretapping c) Symmetric Key Encryption d) Asymmetric Key Encryption

a- OSI Layer: Data Link (2)

Security solution: Mitigate by using an application-layer proxy or an IPS, and train users about fake security certificates. a) Man-in-the-Middle Attack b) SQL Injection Attack c) Ping Sweep Attack d) RPC Attack

a- OSI Layer: Presentation (6)

Cloud platform service. Customers have access to a platform that supports dev and management of web apps. Ex. Subscribing to hardware and software, godaddy.com a) PaaS b) IaaS c) SaaS d) Client-Server

a- PaaS, Platform as a Service

Made up of one glass or plastic fiber. The benefit is the ability to carry higher bandwidth for 50 times the distance of a multimode cable. This requires higher cost electronics to create the light and thus is typically used for longer distances (hundreds or thousands of kilometers) and higher bandwidth applications. a) Single-mode b) Multimode c) Fiber d) UTP Cables

a- Single-mode cables

Is similar to a LAN, except that it covers a large geographical area within its network. a) WAN b) LAN c) CAN d) PAN

a- WAN

Displays information about a user or users on a remote system, including things such as last log-in time and username. It is primarily used in Linux. a) finger b) scp c) nslookup d) route

a- finger

Used to configure the kernel network interfaces. It is implemented at the time of booting to configure the necessary interfaces. Once the interfaces are configured, it is used for debugging or tuning the system. It is primarily used in Linux. a) ifconfig b) tracepath c) traceroute/tracert d) ping

a- ifconfig, Interface Configuration

Provides the user with the IP, subnet mask, and default gateway for each network adapter by default with the /all option information, such as MAC address, DHCP status, and lease information. a) ipconfig b) tracepath c) traceroute/tracert d) ping

a- ipconfig, Internet Protocol Configuration

Displays TCP/IP packets and other network packets that are being transmitted over the network system. It is a form of protocol analyzer (sometimes called a sniffer) and is designed to show the contents of network packets in human-readable form for troubleshooting, security analysis. a) tcpdump b) scp c) nslookup d) nmap

a- tcpdump

A tool most often used to look up who owns a domain or block of IP addresses on the internet, including name, email address, and physical address. However, there are many privacy options that hide this information from being returned. It is primarily used in Linux. a) whois b) ARP c) nslookup d) dig

a- whois

WAN a) wide area network b) windows area network c) world area network d) wookie area network

a- wide area network

This layer of OSI receives the segments and transmits them across the network as packets. As you are accessing the website, this Layer adds the source and destination IP addresses to each individual data packet. The destination IP address will be the router on the network that will move data off the local network. The series of routers between that router and the destination server will determine how the packet is moved across various networks between them. a) Network b) Transport c) Application d) Presentation

a-Network Layer

All mandatory 802.11i features and new hardware, encryption CCMP/AES a) WPA3 b) WPA2 c) WPA d) WEP

b

Attempts to defend the security. a) red team b) blue team c) purple team d) green team

b

Bob receives a message from Alice that she sent using an asymmetric cryptography algorithm. What key should he use to decrypt the message? a) Bob's public key b) Bob's private key c) Alice's private key d) Alice's public key

b

Can systematically check each of these ports by sending thousands of TCP/IP packets to the victim's computer, each packet on a different TCP port. a) Wiretap(ping) b) Port Scanning c) Smurf attack d) Honeypot

b

Data is sent out on network using ethernet. Receiving device receives data but processes it in reverse. Is an example of which layer of the OSI model? a) Data Link Layer b) Physical Layer c) Network Layer d) Transport Layer

b

Diana is investigating suspicious software installed on a machine and would like to identify any network connections made by that machine. Which one of the following tools can best assist her with this task by running it on the target machine? a) tcpdump b) netstat c) traceroute d) nmap

b

Formats data so receiving app can understand, encryption, compression. a) Data Link layer b) Presentation Layer c) Transport Layer d) Application Layer

b

Gateway is part of what OSI layer? a) Data Link layer b) Session Layer c) Transport Layer d) Network Layer

b

Hardware, software, or both designed to prevent unauthorized persons from accessing electronic information. a) Packet Filter Firewalls b) Firewall c) Stateful Inspection d) Application Level

b

IT professionals who specialize in penetrating or compromising network security but only to help an organization improve its own security posture. a) Vulnerability Testers b) White hat hackers c) Black hat hackers d) Script Kiddies

b

Identify where the information came from and if the data has changed since it was originally sent. This is a function that is often incorporated into encryption and, therefore, works well with the confidentiality principle. Part of the CIA triad. a) Confidentiality b) Integrity c) Availability

b

If an attacker gains access to your files or to your physical computers, the attacker can simply steal a copy of the data and crack encryption at their own pace. a) Social Engineering b) Poor Physical Security Measures c) Smurf attack d) Honeypot

b

If an attacker gains access to your files or to your physical computers, the attacker can simply steal a copy of the data and crack encryption at their own pace. a) Social Engineering b) Poor Physical Security Measures c) social engineering d) smurf attack

b

In what type of attack does the attacker attempt to send unauthorized commands to a back-end database through a web application? a) Man-in-the-Middle Attack b) SQL Injection Attack c) Ping Sweep Attack d) Buffer Overflow Attack

b

Man-in-the-middle attacks happen on this OSI layer. a) Data Link layer b) Presentation Layer c) Transport Layer d) Network Layer

b

Overwhelms a victim's computer with an immense volume of ICMP echo-request packets, all containing a forged, randomized source address. a) Buffer Overflow b) Ping flood attack c) ARP poisoning d) Denial-of-Service (DoS)

b

Prepare email. Outlook creates the data (SMTP). Is an example of which layer of the OSI model? a) Network Interface Layer b) Application Layer c) Network Layer d) Transport Layer

b

Receiving mail server is started. Is an example of which layer of the OSI model? a) Presentation Layer b) Session Layer c) Network Layer d) Transport Layer

b

Remote Procedure Call (RPC) attacks happen on this OSI layer. a) Data Link layer b) Session Layer c) Transport Layer d) Network Layer

b

Report on user's access Provides forensic trail after a security breach Logs successful and unsuccessful connection attempts. a) Interpreting b) Accounting c) Authorization d) Authentication

b

SQL Injection, Buffer overflow happen on this OSI layer. a) Data Link layer b) Application Layer c) Transport Layer d) Network Layer

b

The combination of services running in both public and private clouds. The security concerns typically fall along the lines of the owners of the equipment, much like in private and public clouds, with the addition of the data link between the public and private cloud networks, which may be maintained and secured by a third party. a) Cloud applications b) Hybrid Cloud c) Public Cloud d) Private Cloud

b

The disadvantage from using this device results from the fact that any incoming signal on any of its ports is re-created and sent out on any connected ports which has a negative impact on network performance. a) Switch b) Hub c) Router d) Bridge

b

The goal is to ensure that the data is always accessible by its authorized users. a) Confidentiality b) Availability c) Accuracy d) Integrity

b

The password cracker tries every possible combination of characters. a) zero- day attack b) brute force attack c) honeypot d) smurf attack

b

The server unknowingly exchanges information with the attacker, believing they are the client, then the attacker forwards the information to the client so nobody notices a break in connection a) Wiretapping b) Spoofing c) Smurf attack d) Honeypot

b

This form of attack can include putting special taps in-line with a computer's network cable and then using a packet sniffer to listen and record the traffic on the network. a) spoofing b) wiretapping c) social engineering d) smurf attack

b

This is a man-in-the-middle attack where the attacker impersonates the sender and receiver of the traffic. a) Wiretapping b) Spoofing c) Smurf attack d) Honeypot

b

This layer is responsible for the physical connections of the devices in the network. a) Data Link layer b) Physical Layer c) Transport Layer d) Network Layer

b

What are the characteristic components of the OSI data link layer? a) IP Packet, Network switch, Router b) Network switch, MAC Address, Ethernet Frame c) Hub, Network cabling, Repeater d) Network cabling, Router, Repeater

b

What are the characteristic traits of single-mode fiber optics? a) Transmission distances of up to 2 km, More expensive than multimode fiber optics, Uses LED as the source of light b) More expensive than multimode fiber optics, Transmission distances of up to 100 km, Uses laser as the source of light c) Transmission distances of up to 2 km, Uses laser as the source of light, Less expensive than multimode fiber optics d) Transmission distances of up to 100 km, Uses LED as the source of light, Less expensive than multimode fiber optics

b

What is the name of a Windows command-line utility that can be used to display TCP/IP configuration settings? a) ifconfig b) ipconfig c) nslookup d) netstat

b

What is the purpose of a DoS attack? a) Code injection b) Resource exhaustion c) Malware infection d) Privilege escalation

b

Which category of the CIA triad is affected when an unauthorized user changes the data within a read-only file? a) Confidentiality b) Integrity c) Availability d) Authority

b

Which of the following answers refer to examples of network layer header data? a) Destination Port number, Source Port number b) Source IP address, Destination IP address c) Source Port number, Destination IP address d) Destination Port number, Source IP address

b

Which of the following answers refer to the OSI Data Link Layer header data? a) Destination Port number, Source Port number b) Source MAC address, Destination MAC address c) Source Port number, Destination MAC address d) Destination Port number, Source MAC address

b

Which three layers of the OSI model are the same as the Application layer of the TCP/IP model? a) Physical, Application and Data Link b) Application, Session and Presentation c) Network, Application and Presentation d) Transport, Application and Data Link

b

Which topology uses a switch or hub to connect to all devices in the same network? a) Bus topology b) Star topology c) Mesh topology d) Ring topology

b

While investigating a security incident, a technician discovers an unauthorized packet-capturing tool on the network. Which category of the CIA triad is being attacked? a) Confidentiality b) Integrity c) Availability d) Authority

b

Wiretapping / Packet Sniffing, entry/access to server room, cables etc happens on this OSI layer. a) Data Link layer b) Physical Layer c) Transport Layer d) Network Layer

b

Which model consists of an application layer, a transport layer, a network layer, and a network interface layer. a) FTP b) TCP/IP c) OSI d) ISO

b - TCP/IP, transmission control protocol/internet protocol

________ is a common set of protocol standards that permit the appropriate transmission of data and are used to connect network devices to each other. a) OSI b) TCP/IP c) peer-to-peer d) client-server

b - transmission control protocol/internet protocol

___________ model consists of a seven-layer architecture that organizes the sending of data from hosts across a network. a) TCP/IP b) OSI c) FTP d) ISO

b- (Open System Interconnection) model

A system administrator wants to protect the local network from untrustworthy external traffic. Which device should this system administrator implement? a) Switch b) Firewall c) Router d) Repeater

b- A network firewall is a barrier that intercepts and inspects traffic moving from one network to another.

Displays the IP to physical (MAC) address mappings for hosts that have been discovered in the ______ cache. _____ can be used to add, remove, or modify entries in the ______ cache. a) netstat b) ARP c) nslookup d) dig

b- ARP, Address Resolution Protocol

Which network type does not require a wireless router or access point between clients? a) WAN b) Ad-hoc c) SAN d) Infrastructure

b- Ad-hoc means "for this" in Latin, and is a quick impromptu connection between client machines.

This layer of the OSI model is responsible for network applications (like HTTP or FTP) and their production of data to be transferred over the network. a) Transport Layer b) Application Layer c) Network Layer d) Presentation Layer

b- Application Layer

This layer of the TCP/IP model is responsible for the communication protocols between nodes. The protocols in this layer include hypertext transfer protocol (HTTP and HTTPS), Secure Shell (SSH), and network time protocol (NTP), among many others. a) Network Interface Layer b) Application Layer c) Network Layer d) Transport Layer

b- Application Layer

A person, device, location, or information that SecOps aims to protect from attack. a) Risk b) Asset c) Vulnerability d) Threat

b- Asset

Is used in Ethernet LANs containing two twisted pairs allowing for up to 100 Mbps up to 100 meters between the device and the switch, hub, or router. This has been practically replaced by the Cat5e specification. a) Cat4 b) Cat5 c) Cat5e d) Cat3

b- Cat5

This layer of the OSI model is responsible for the error-free delivery of data to the receiving device or node. This layer is implemented through the use of devices such as switches and bridge devices, as well as anything with a network interface, like wireless or wired network cards. a) Transport Layer b) Data Link Layer c) Network Layer d) Network Interface Layer

b- Data Link Layer

What is the purpose of a firewall? a) To protect electronic data from damage caused by fluctuation in temperature b) To restrict traffic from entering (ingress) or exiting (egress) a network c) To protect physical assets from fire or other disasters

b- Firewalls prevent the ingress and egress of malicious data.

Which of the following protocols reside(s) at the application layer of the OSI model? a) IP, HTTP b) HTTP, FTP, SMTP c) TCP, UDP d) IP, ICMP, FTP

b- HTTP or Hyper Text Transfer Protocol, FTP or File Transfer Protocol, while SMTP or Simple Mail Transfer Protocol.

________________ are like a layer of system software between computer hardware and virtualized systems. ______________ can be used to control and manage access to hardware resources by one or more virtual systems. a) Virtual Application Developer b) Hypervisors c) Virtual Machines d) Virtual System Admin

b- Hypervisors

________________ means that the customer is responsible for all software and data beyond the hypervisor. The cloud service provide is responsible for the hypervisor and all hardware in the system. a) PaaS b) IaaS c) SaaS d) Client-Server

b- IaaS

Cloud infrastructure service. Access to virtual environment and composed of virtual hardware. Ex. Subscribing to hardware, Router. User a) PaaS b) IaaS c) SaaS d) Client-Server

b- IaaS, Infrastructure as a Service

Consists of computers connected within a limited area. a) WAN b) LAN c) CAN d) PAN

b- LAN

Sometimes called 2-factor authentication (2FA), is an optional, but highly recommended, add-on to the authentication process. a) TLS b) MFA c) SSL d) IAM

b- Multi-factor authentication

Wider in diameter due to light modes being sent across the cable. These fibers are highly effective over medium distances (500 meters or less at higher speeds) and are generally used within a LAN. They are also less expensive than single-mode fiber due to the potential for use with LEDs and other lower-cost options for creating the light. a) Single-mode b) Multimode c) Fiber d) UTP Cables

b- Multimode cables

Security solution: Leverage a reverse proxy system and scan incoming packets for malicious behavior. a) Man-in-the-Middle Attack b) SQL Injection Attack c) Ping Sweep Attack d) RPC Attack

b- OSI Layer: Application (7)

Security solution: Look for physical vulnerabilities, check the locks on doors, racks, and wiring closets. a) VLAN Hopping b) Wiretapping c) Symmetric Key Encryption d) Asymmetric Key Encryption

b- OSI Layer: Physical (1)

A computer network style that processes both requests and provides service to each other. All devices support same function. Ex. Instant messaging, BitTorrent, multiplayer online games, like Apex or Fortnite. a) PaaS b) Peer-To-Peer c) SaaS d) Client-Server

b- Peer-To-Peer

Overwhelms a victim's computer with an immense volume of ICMP echo-request packets, all containing a forged, randomized source address. a) Smurf Attack b) Ping Flood Attack c) Buffer Overflow d) ARP poisoning

b- Ping flood, also known as Internet Control Message Protocol (ICMP) flood, is a common Denial of Service (DoS) attack in which an attacker takes down a victim's computer by overwhelming it with ICMP echo requests, also known as pings.

A network that allows access to storage devices specifically instead of the more general networking that can be used for any purpose. a) WAN b) SAN c) CAN d) PAN

b- SAN, storage area network

Command is used to securely copy files between servers, leveraging SSH (secure shell) for authentication and encryption. a) whois b) scp c) nslookup d) route

b- Secure Copy Protocol (SCP)

Which of the protocols listed below reside at the OSI transport layer? a) IP, UDP b) UDP, TCP c) TCP, SSL/TLS d) IP, ICMP

b- TCP, or Transmission Control Protocol, and UDP, or User Datagram Protocol, are part of the internet protocol suite. TCP and UDP are different methods to send information across the internet.

A security analyst is tasked to test a website for OSI Application Layer vulnerabilities. The first test is to see if the fields on the website will execute code on the database server integrated with the site. The analyst types some text into the "email" box in a web form: admin' or '1'='1 The web application responds with the following message: Invalid Email Format. You have an error in your syntax; check the manual that corresponds to your database server version for the right syntax to use near 'in' at line 1. Which type of exploit is this analyst assessing for? a) SYN Flood Attack b) SQL Injection Attack c) Buffer Overrun Attack d) Man-in-the-Middle Attack

b- The SQL injection attack. The web developer should modify the website to prevent scripts from running through the forms.

In this layer of OSI data is transferred and is then segmented and numbered to send the data across the network in sizes the network can handle (typically around 1,500 bytes maximum) and to reassemble it in the correct order by the webserver. a) Session b) Transport c) Application d) Presentation

b- Transport

What is a characteristic of symmetric key encryption? a) use of a public and private key b) use of a shared key c) elliptic curve cryptography d) public key infrastructure

b- Use of a shared key is a characteristic of symmetric key encryption.

ipconfig a) intranet protocol configuration b) interface protocol configuration c) ideal path configurational d) image path configuration

b- internet protocol configuration

Allow a user to manage accounts and devices remotely. The main difference between the two is that the second part is encrypted, and thus all data is secure from eavesdropping, while first part is unencrypted. a) tcpdump b) telnet/ssh c) nslookup d) ssh

b- telnet/ssh, Telecommunications Network/ Secure SHell

Is similar to traceroute or tracert in that it displays the path taken by a packet from its source to its destination. This command is useful because it can be used by any user instead of needing superuser privileges. It is primarily used in Linux. a) ipconfig b) tracepath c) traceroute/tracert d) ping

b- tracepath

An IP address is also referred to as a ___________. a) Physical address b) Universal address c) Logical address d) Internet address

c

An analyst has identified an active denial of service attack. Which category of the CIA triad is affected? a) Confidentiality b) Integrity c) Availability d) Authority

c

An attack that broadcasts a ping request to all computers on the network yet changes the address from which the request came to that of the target. a) Social Engineering b) Spoofing c) Smurf attack d) Honeypot

c

Are hosted by companies, such as Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform (GCP), and tend to offer highly scalable, multi-tenant solutions in data centers placed around the world. a) Cloud applications b) Hybrid Cloud c) Public Cloud d) Private Cloud

c

Are the copycat criminals of the hacking community. They typically hack out of pure curiosity or entertainment and often use poorly documented tools or scripts written by much more advanced hackers. a) Copycat Kids b) Script Kittens c) Script Kiddies d) Kiddie Hackers

c

Defends against the team that is trying to see if their security can withstand an attack. In order to find vulnerabilities. a) red team b) grey team c) blue team d) purple team

c

Define what the user can access Give permissions to a user Write and delete or read-only. a) Interpreting b) Accounting c) Authorization d) Authentication

c

Firewall is part of what OSI and TCP/IP layer? a) Data Link layer b) Physical Layer c) Transport Layer d) Network Layer

c

IP address of mail server is added to data as well as source IP. Is an example of which layer of the OSI model? a) Presentation Layer b) Session Layer c) Network Layer d) Transport Layer

c

IT professionals who specialize in penetrating or compromising network security but only to help an organization improve its own security posture. a) black hat hackers b) grey hat hackers c) white hat hackers d) red had hackers

c

Known as private key encryption, uses the same key to encrypt the data as it does to decrypt the data. a) Transport Layer Security b) Secure Sockets Layer c) Symmetric Key Encryption d) Asymmetric Key Encryption

c

May or may not be IT professionals but possess the knowledge and will to breach systems for profit. That profit may be monetary, street credibility, or just a source of entertainment. a) Vulnerability Testers b) White hat hackers c) Black hat hackers d) Script Kiddies

c

Much like the SQL injection attack, this attack is made possible by applications that do not properly validate user input for extraneous content. In this case, the attacker purposefully enters text that is too large to fit within a region of memory . a) Wiretapping b) Port Scanning c) Buffer Overflow d) ARP poisoning

c

PAT a) Packet Address Translation b) Packet Authorization Tech c) Port Address Translation d) Priority Authorization Translator

c

Star Topology is sometimes referred to as a __________. a) Map Topology b) Wheel Topology c) Hub and Spoke Topology d) Interstellar Topology

c

The goal is to ensure that the data is always accessible by its authorized users. Part of the CIA triad. a) Confidentiality b) Integrity c) Availability

c

This feature allows a firewall to identify traffic as conversational and automatically create temporary firewall rules to permit the response traffic to flow back to the sender. a) Personal firewall b) Network firewall c) Stateful firewall d) Application Layer firewall

c

This layer provides services to the application layer and receives services from the network layer. It is responsible for the reliable delivery of data. a) Data Link layer b) Presentation Layer c) Transport Layer d) Session Layer

c

What are the characteristic features of the RJ45 connector? a) Coaxial cabling connector, Used with telephone cabling b) Used with Ethernet network cabling, Fiber-optic cabling connector c) Twisted-pair copper cabling connector, Used with Ethernet network cabling d) Used with telephone cabling, Twisted-pair copper cabling connector

c

Which encryption application provides authentication and encryption services that are commonly used to create VPN tunnels at OSI Network Layer? a) SSL b) TLS c) IPSec d) AES

c

Which of the answers listed below refer to the characteristics of multimode fiber optics? a) Transmission distances of up to 2 km, More expensive than single-mode fiber optics, Uses laser as the source of light b) More expensive than single-mode fiber optics, Transmission distances of up to 100 km, Uses laser as the source of light c) Transmission distances of up to 2 km, Uses LED as the source of light, Less expensive than single-mode fiber optics d) Transmission distances of up to 100 km, Uses LED as the source of light, Less expensive than single-mode fiber optics

c

Which of the answers listed below refer(s) to UTP cabling? a) Twisted-pair copper cabling, Takes advantage of additional protective cover reducing signal interference from outside sources, Coaxial cabling, Fiber-optic cabling b) Low cost and ease of installation, Coaxial cabling, Not surrounded by any shielding that would provide protection against interference from outside sources c) Twisted-pair copper cabling, Used in Ethernet networks and telephone systems, Low cost and ease of installation, Not surrounded by any shielding that would provide protection against interference from outside sources, In Ethernet networks, installed with RJ45 connector type d) Used in Ethernet networks and telephone systems, Not surrounded by any shielding that would provide protection against interference from outside sources, Fiber-optic cabling, In Ethernet networks, installed with RJ45 connector type

c

Which of the following reside at the physical layer of the OSI model? a) IP Address, Network switch, Router b) Network switch, Hub, Ethernet Frame c) Hub, Network cabling, Repeater d) Network cabling, Router, Repeater

c

Which of the network software tools listed below allows for obtaining a domain name to IP address mapping? a) tracert b) netstat c) nslookup d) finger

c

While the other teams engage, and when certain success criteria are met, the teams debrief, cross-train each other, and repeat. a) red team b) blue team c) purple team d) green team

c

You have implemented a network where each device provides all other devices on the network with access to shared files. What type of network do you have? a) IaaS b) TCP/IP c) peer-to-peer d) client-server

c

Your manager has asked you to implement a wired network infrastructure that will accommodate failed connections. Which of the following network topologies should you implement? a) Ring b) Bus c) Mesh d) Star

c

The __________ model is used to enable the efficient transmission of data among hosts on a network. a) FTP b) TCP/IP c) OSI d) ISO

c - OSI, Open System Interconnection model

What is a hypervisor? a) A hardware tool used to host virtual systems b) A virtual application developer c) A software tool used to host virtual machines d) A virtual system administrator

c- A software tool used to host virtual machines

In this layer of OSI you open a web browser on your laptop and type www.wgu.edu into the search bar. a) Physical b) Transport c) Application d) Presentation

c- Application

An action taken by a threat that exploits a vulnerability that attempts to either block authorized access to an asset, or to gain unauthorized access to an asset. a) Risk b) Asset c) Attack d) Sec-Ops

c- Attack

Provides networking of multiple LANs across a limited area, like a university campus or a group of buildings owned by a company. a) WAN b) LAN c) CAN d) PAN

c- CAN, campus area network

Doubles the number of twisted pairs to four for up to 1 Gbps (Gigabits per second) over up to 100 meters. a) Cat6 b) Cat5 c) Cat5e d) Cat3

c- Cat5e

This layer of OSI receives the packets and adds physical addressing by adding sender and receiver MAC addresses to each data packet. This information forms a unit called a frame. a) Session b) Transport c) Data Link d) Presentation

c- Data Link

Use glass or plastic threads within cables to transfer the data using light (lasers or LEDs) as opposed to traditional metal cables using electricity. a) Coaxial b) STP c) Fiber d) UTP Cables

c- Fiber cables, or fiber-optic cables

Data is unencrypted copies the file from one host to another host a) whois b) scp c) ftp d) route

c- File Transfer Protocol (ftp)

A device necessary for sending and receiving data. Allows computers to transport digital information over analog lines, such as phone or cable lines. a) Router b) Switch c) Modem d) Bridge

c- Modem

This layer of the OSI model is responsible for the transmission of data between hosts in different networks as well as routing of data packets. This layer is implemented through the use of devices such as routers and some switches. a) Transport Layer b) Application Layer c) Network Layer d) Network Interface Layer

c- Network Layer

There is no individually designated server or client. Each machine on the network can act as both server and client, sometimes requesting data from other nodes and sometimes answering requests from others. a) Peer-Network b) Person-Network c) Peer-To-Peer d) Client-Server

c- Peer-to-Peer, P2P

This layer of OSI receives the frames and data and sends them via the local media (copper wires, fiber-optic cables, etc.) to the switches, routers, etc., along the network path. All of this takes a matter of microseconds to achieve. a) Session b) Transport c) Physical d) Presentation

c- Physical

Represents nearly anything you consume over the internet. A few examples include social media (Facebook), word processing (Office 365), and a line of business applications (Salesforce). Even now, you are using this solution to view this course and read this text. This allows consumers to store and potentially publish information without the need to manage the underlying applications or infrastructure. a) PaaS b) Client-Server c) SaaS d) IaaS

c- SaaS, Software as as Service

A weakness in software, hardware, facilities, or humans that can be exploited by a threat. a) SecOps b) Asset c) Vulnerability d) Threat

c- Vulnerability

What is the fastest encryption method for bulk encryption of data? a) Asymmetric key encryption b) TLS c) Symmetric key encryption d) AES

c-Symmetric key encryption is the fastest encryption method because it uses a single key to encrypt and decrypt the data.

A ___________ gateway is a device that operates as a middleman between two or more systems to help conceal the true identity of the client and server. The gateway may change the IP address and the TCP/UDP port number of the traffic to allow two networks to communicate that otherwise could not (for example, your home network and the internet). a) stateful inspection b) application-level c) address-level d) circuit-level

d

A ____________ attempts to spoof the source address of ICMP packets and broadcast to the network in an attempt to flood it. a) spoofing b) wiretapping c) honeypot d) smurf attack

d

An attack that broadcasts a ping request to all computers on the network yet changes the address from which the request came to that of the target. a) spoofing b) wiretapping c) honeypot d) smurf attack

d

An attack that relies on altering the burned-in address of a NIC to assume the identity of a different network host is known as: a) Smurf Attack b) DNS poisoning, ARP Poisoning c) Replay attack d) ARP Poisoning, MAC spoofing

d

Analyzes packet content and blocks program-level traffic. a) Data Link layer b) Physical Layer c) Transport Layer d) Application Layer

d

Analyzes packet content and blocks program-level traffic. a) Packet Filter Firewalls b) Firewall c) Stateful Inspection d) Application Level

d

How does a Smurf attack operate? a) It causes hosts to reboot repeatedly b) It creates multiple VPN connections with hosts c) It creates half open connections d) It spoofs the source address for all ICMP packets

d

Identifies malicious traffic. Available as virtual and host-based applications. Can be configured to operate in tap mode. a) IPS b) IDS c) TCP d) both a and b

d

Identify where the information came from and if the data has changed since it was originally sent. This is a function that is often incorporated into encryption and, therefore, works well with the confidentiality principle. a) Confidentiality b) Availability c) Accuracy d) Integrity

d

Nancy is responsible for the administration of many different servers in her company. Which one of the following commands can she use to gain command-line administrative access to her Linux servers in a secure manner? a) FTPS b) SCP c) telnet d) SSH

d

Scalable, single-tenant clusters of computing, storage, and networking resources owned and maintained by a single company, typically (but not always) located within a data center belonging to that company. The owner of the equipment typically holds the final responsibility for all the hardware and most, if not all, of the physical data center security concerns. a) Cloud applications b) Hybrid Cloud c) Public Cloud d) Private Cloud

d

Security Mitigation: Authentication, Input validation, reverse proxy system, IPS, Updates a) Data Link layer b) Physical Layer c) Transport Layer d) Application Layer

d

Security Mitigation: Packet filtering firewall, IPS a) Data Link layer b) Physical Layer c) Transport Layer d) Network Layer

d

Sue is inspecting her application logs and finds log records that indicate attackers may be attempting to use SQL injection attacks to access the database underlying her application. What is the most effective security control that Sue can apply to address this risk? a) Personal firewall b) Network firewall c) Stateful firewall d) Application Layer firewall

d

The copycat criminals of the hacking community. They typically hack out of pure curiosity or entertainment and often use poorly documented tools or scripts written by much more advanced hackers. a) Gray hat hackers b) White hat hackers c) Black hat hackers d) Script Kiddies

d

The copycat criminals of the hacking community. They typically hack out of pure curiosity or entertainment and often use poorly documented tools or scripts written by much more advanced hackers. a) Virus testers b) Attack testers c) Vulnerability Testers d) Script Kiddies

d

The most common forms of encryption found on the internet today. a) Transport Layer Security b) Secure Sockets Layer c) Symmetric Key Encryption d) both a and b

d

They deny someone access to a service, usually by overwhelming the victim with enormous amounts of useless traffic. a) Buffer Overflow b) Ping flood attack c) ARP poisoning d) Denial-of-Service (DoS)

d

This layer is responsible for network applications and their production of data to be transferred over the network. a) Data Link layer b) Physical Layer c) Transport Layer d) Application Layer

d

What are the characteristic traits of a network switch? a) Makes forwarding decisions in software, Typically capable of connecting fewer network segments than bridge (fewer physical ports), Older and less effective type of network device in comparison to network bridge b) Makes forwarding decisions in hardware (ASIC), Typically capable of connecting more network segments than bridge (more physical ports), Older and less effective type of network device in comparison to network bridge c) Newer and more effective type of network device in comparison to network bridge, Typically capable of connecting more network segments than bridge (more physical ports), Makes forwarding decisions in software, Sometimes referred to as multiport bridge d) Makes forwarding decisions in hardware (ASIC), Newer and more effective type of network device in comparison to network bridge, Typically capable of connecting more network segments than bridge (more physical ports), Sometimes referred to as multiport bridge

d

What is the most common network topology today? a) Ring b) Bus c) Mesh d) Star

d

When certain success criteria are met, the teams debrief, cross-train each other, and repeat. To see if their security can withstand and attack. In order to find vulnerabilities. a) red team b) grey team c) blue team d) purple team

d

Which of the following command-line tools is used for discovering hosts and services on a network? a) tcpdump b) netstat c) traceroute d) nmap

d

Why would a business likely choose a hybrid cloud solution? a) They want a cloud provider to take responsibility for all hardware aspects of their systems. b) They want to maintain total control of all hardware their software runs on. c) They want to jointly own and control the hardware their software runs on. d) They want to use their own systems but add the ability to scale up for bursts of demand.

d

You have a small network that uses a switch to connect multiple devices. Which physical topology are you using? a) Ring b) Bus c) Mesh d) Star

d

You were recently hired by a small start-up company. The company has no plans to setup their own datacenter. You have been asked to find a cloud service that would provide several physical servers or virtual machines that the company would be able to install whatever operating systems and applications they need. Which cloud service model should you use? a) PaaS b) Client-Server c) SaaS d) IaaS

d

__________was developed by the International Standards Organization (ISO) after the TCP/IP model to provide greater granularity of networking assignments within the model. a) TCP/IP b) ISO c) FTP d) OSI

d- (Open System Interconnection) model

WLAN a) wired local area network b) wide lane actual network c) working local area network d) wireless local area network

d- A wireless local area network

Why would someone choose to implement Advanced Encryption Standards (AES) encryption over Triple Data Encryption Standard (3DES) encryption? a) For transmission over longer distances b) Because they prefer to use a symmetric algorithm key c) To hide the network name from discovery protocols. d) For a more secure level of encryption due to increased complexity.

d- AES is more complex and secure than 3DES, which is generally worth the updated system requirements.

Which is a method attackers use to cause an Ethernet switch to flood all traffic to every port on the switch, including the attacker's computer. a) Wiretapping b) Port Scanning c) Buffer Overflow d) ARP poisoning

d- Address Resolution Protocol (ARP) poisoning is when an attacker sends falsified ARP messages over a local area network (LAN) to link an attacker's MAC address with the IP address of a legitimate computer or server on the network.

Supports up to 10 Mbps (Megabits per second) for up to 100 meters and is commonly used for phone lines today. a) Cat4 b) Cat5 c) Cat5e d) Cat3

d- Cat3

What is the result of the encryption process? a) Public Key b) Shared Key c) Plaintext d) Ciphertext

d- Encrypted plaintext is called ciphertext.

Refers to the physical servers, storage, and networking that is required to exist before you can create any virtual servers or install any applications. a) PaaS b) Client-Server c) SaaS d) IaaS

d- IaaS, Infrastructure as a Service

Cloud providers, both private and public, require a form of authentication to prove your identity and include authorization rules, to control what you may access a) TLS b) MFA c) SSL d) IAM

d- Identity and Access Management

Provides networking across a larger area than a CAN, but smaller than a WAN, such as a whole city or the equivalent of a metropolitan area (hence the name), though it is not necessarily limited by city boundaries. a) WAN b) LAN c) CAN d) MAN

d- MAN, metropolitan area network

This TCP/IP model layer establishes how data should be physically sent through the network. a) Transport Layer b) Data Link Layer c) Network Layer d) Network Interface Layer

d- Network Interface Layer

Security solution: Mitigate with regular OS and application patching. a) Man-in-the-Middle Attack b) SQL Injection Attack c) Ping Sweep Attack d) RPC Attack

d- OSI Layer: Session (5), Remote Procedure Calls (RPCs) are a generic framework for clients to execute procedures on servers and have the result returned if there is one.

A network that is centered around a person and their devices. a) WAN b) LAN c) CAN d) PAN

d- PAN, personal area network

A hybrid of a hub-and -spoke topology and a full-mesh topology. a) Bus topology b) Star topology c) Full-mesh topology d) Partial-mesh topology

d- Partial-mesh topology

Security solution: Mitigate by using a packet-filtering firewall. a) Man-in-the-Middle Attack b) Port Scanner c) Ping Sweep Attack d) both b and c

d- Port scanner on OSI Layer: Transport (4), Ping Sweep Attack on OSI Layer: Network (3)

In this layer of OSI the command is then sent to this Layer to be encrypted as it is sent (and decrypted when received by the webserver). a) Physical b) Transport c) Application d) Presentation

d- Presentation

This layer of the OSI model is responsible for translating data from the application layer into the format required to transmit the data over the network as well as encrypting the data for security if encryption is used. a) Transport Layer b) Application Layer c) Network Layer d) Presentation Layer

d- Presentation Layer

A connector that supports two pairs of wires (four total); typically used in telephones. a) Cat6 b) Ethernet c) RJ45 d) RJ11

d- RJ11

SCP a) Security Cache Procedure b) System Control Passport c) Structural Cap Packet d) Secure Copy Protocol

d- Secure Copy Protocol

Something or someone that can exploit a vulnerability to attack an asset. a) SecOps b) Asset c) Vulnerability d) Threat

d- Threat

A _______________is installed as an application within another operating system environment that allows the use of virtual machines from within that same environment. a) KVM b) Type 1 Hypervisor c) VM d) Type 2 Hypervisor

d- Type 2 Hypervisor

Many IT professionals use a Macbook Pro for personal computing at home, and to work remotely. Sometimes they need a Microsoft Windows application for work. Rather than buy another laptop, the IT team from the office can install a Windows environment that can run Windows applications on MacOS. What kind of software will the IT team need to install on a Mac to enable it to run this Windows environment? a) KVM b) Type 1 Hypervisor c) VM d) Type 2 Hypervisor

d- Type 2 Hypervisor

Referred to as a hosted hypervisor a) KVM b) Type 1 Hypervisor c) VM d) Type 2 Hypervisor

d- Type 2 Hypervisors

These cables are created when pairs of wires are twisted around each other to protect and cancel out interference from each other and outside sources. a) Coaxial b) STP c) Fiber d) UTP Cables

d- Unshielded Twisted Pair Cables

Which Transport layer protocol is best suited for streaming audio and video? a) HTTP b) TCP c) IP d) UDP

d- User Datagram Protocol is the correct answer as it is connectionless and does not wait for verification of successful transmission before it sends more data, hence, resulting in quicker transmission speeds.

Users and devices can be placed anywhere and move anywhere in the coverage area. This is a popular choice for small businesses, as it is easy and inexpensive to install and allows guests to use the network as well with a hotspot service. a) WAN b) LAN c) CAN d) WLAN

d- WLAN, wireless local area network

Is a command used to query the DNS name servers. It is helpful in troubleshooting DNS problems. It is also used for lookups and will display answers from the query. It is a replacement for nslookup. a) netstat b) ARP c) nslookup d) dig

d- dig, domain information groper

Scans networks to see what it can find in terms of hosts and open ports commonly used to determine what is deployed on a network for vulnerability analysis, security scans, and related activities. Is not native to either Linux or Windows but can be downloaded for free and used with both. a) finger b) scp c) nslookup d) nmap

d- nmap, network mapper

One of the most basic tools for testing connectivity to other hosts useful in troubleshooting connectivity with other devices. a) ipconfig b) tracepath c) traceroute/tracert d) ping

d- ping

Used to display the current route tables on a host. Can also be used to add or remove routes. This is used by the local host to determine where to send traffic (0.0.0.0 means the default gateway, where the router sends things if it is not otherwise defined in the routing table). a) whois b) ARP c) nslookup d) route

d- route


Conjuntos de estudio relacionados

Biology in Focus Chapter 3 Review

View Set

Business Communications- Chapter 6

View Set

Chapter 3: Organizational Climate and Culture

View Set

Chapter 4: Credit Risk Analysis and Interpretation

View Set

WEEK 3:: PYTHON CRASH COURSE : LOOPS, WHILE LOOPS

View Set

Chapter 8 - Management Structures & Organization - Complete

View Set

05.F BIO, HN The Calvin Cycle (PART F)

View Set