1D7XX - Cyber Defense Operations (UGT)
How many devices are supported in a daisy-chain configuration when using thunderbolt cables?
6
Which switch port security initiative is referred to as port-based network access control (PNAC)?
802.1X
What best describes the Daubert standard?
A standard for evidence in US Federal courts
Which component of Amazon Web Services allows you to connect to your on-premises applications and services?
AWS Storage Gateway
Given the data center network topology, where is security defined?
Access switches
A hybrid network topology is created by combining which other topologies?
Any combination of two or more topologies of any type
The use of a smartjack provides which capabilities for a demarcation point?
Diagnostic and monitoring
Which type of video interface uses packetized data transmissions?
DisplayPort
With physical incidents what id the most important issue?
Safety
A DDoS attack would most accurately be described as a ___?
Service interruption
Which scenario would best warrant the implementation of a RADIUS server?
When you have multiple network access servers, with a single authentication policy
Select the most current Wi-Fi standard available.
- 802.11n - 802.11ac - 802.11ar
You have been tasked with setting up a network for mobile laptop users. These users could potentially move from location to location from with inside of your companies build. Which of the following devices should be deployed? (Choose two)
- Access point - WLAN Controller
How many connections are needed to connect 6 devices in a mesh topology assuming only a single connection between any two devices?
15
Which specialty appliance would be used to make SSH2 connections to a backend database or directory service to perform secure dedicated management and administration as opposed to direct connections?
Bastion host
Which of the following terms best describes a network that spans multiple buildings?
CAN
Match the topology to its description.
- Star - Host connected to a backbone - Mesh - Hosts connected to each other forming a circle - Ring - Hosts connected to a central device - Bus - Hosts connected to each other
Which characteristic of a switch distinguish it from a hub?
- Switches forward traffic based on the MAC address - Switches operate at layer 2 of the OSI model, hubs operate at layer 1
Category 5 cable is limited to what transmission speed?
100 Mbps
What is a suite of tools used to identify and report on fraudulent, illegal, or other undesirable behavior concerning data in transit or at rest?
DAM
If you needed to convert between digital and analog video, which adapter would be required?
DVI - VGA
What function does the shielding provide in Shielded Twisted Pair cabling?
More resistance to interference
Routers operate at which layer of the OSI model?
Network
A range extender is the wireless equivalent to which wired device?
Repeater
A persistent VPN that is established between two physical locations such as a branch office to headquarters with VPN concentrators on both ends is an example of which type of VPN?
Site-to-site
In which scenario would you implement a modem?
To connect a host to the Internet over a phone line
What are the two most significant benefits of implementing a hybrid cloud solution for a backup and recovery strategy?
- Scalability - Accessibility
Which service level offering within the Google Cloud Platform would be most appropriate for data that is accessed the least often?
Archive
Which of these IPsec protocols offers additional confidentiality services?
ESP
Satellite internet service has which primary advantage over most other types of services?
Global availability
What prevents undesirable traffic from crossing network boundaries created in the campus area network?
Firewall
Which type of network would typically be used to cover very large geographical areas such as from country to country?
WAN
Which of these protocols is commonly load balanced?
- TCP - HTTP - TLS - UDP
Which characteristics of a bridge distinguish it from a switch?
- Bridges can connect dissimilar architectures - Switches connect host systems together, bridges connect network segments - Bridges can connect dissimilar types of media
Match the networking services with the correct networking architecture tier.
- Distribution - Apply filtering and routing policies - Core - Provide high speed backbone networking - Access - Apply network access policies
Which are operational modes in which a Cisco access point can operate in?
- FlexConnect mode - Rogue mode - Local mode - Monitor mode
Match the Cisco access point mode to its operational characteristic
- IDS, location-based services - Monitor mode - Used for meshing - Bridge mode - Allows AP to switch to VLAN operation - FlexConnect mode - Detects rogue access points - Rogue mode - Unstable or slow WANs - FlexConnect mode - Known as foundational mode - Local mode
A load balancer can provide which networking features?
- Improved performance and availability by ensuring servers do not become overwhelmed - Even distribution of traffic across servers performing the same function
Which describes Cisco access points?
- Lightweight Aps are known as intelligent APs - Omni directional is a type of integrated AP antenna - Autonomous APs are known as thick clients
Which types of conversions can be performed by media converters?
- Multi-mode fiber to single mode fiber - Electrical signals (copper wire) to light signals (fiber optic)
Given the position of the campus network, what are some key security goals that need to be defined?
- Network infrastructure protection - Endpoint protection
Based on the graphic, if node 1 of this ring network topology goes down, what happens to communication on the rest of the network?
All nodes will lose connectivity
Which type of backup might be the best implemented to use with personally owned devices to minimize the impact on users?
Continuous incremental backups
In which scenario would you be most likely to use a tone generator/ probe?
Determining the termination point of a cable
In a bus network topology, by which means do systems connect to each other?
Each systems connects to adjacent systems only in a linear fashion
Configuring radio balancing in a wireless controller refers to which feature?
Ensuring that all 802.11n clients are connected to 802.11n access points
What is a network with resources under the control of another organization such as a strategic partner in which your organization also needs access?
Extranet
In which scenario would you be most likely to use a loopback plug?
Suspected issues with your local network interface port
Given the campus area network, what are the security measures that can be defined?
- Port security - VLANs - ACLs
In a start topology, by which means do systems connect to each other?
All systems connect to a central connection device
What network topology is a compromise between redundancy and cost?
Hybrid
Which types of wireless access points might be used by an attacker to gain access to confidential information?
- Rogue - Evil twin
Match the virtual network topology service to its characteristic.
- Sandboxed environment - PaaS - You provide security for devices - IaaS - Vendor protects others from your devices - IaaS - Vendor control software and security - SaaS - Protects against interfering with other tenants - PaaS
Which security functions can be performed by a proxy server?
- Shielding internal addresses from the public Internet - Packet examination and filtering
What components are common within the virtual topology?
- Storage hardware - Host - Hypervisor software
Which transmission characteristics would best describe the properties of serial peripheral cables?
- Transmits more effectively over longer distances - Transmits a single bit at a time - Generally used for small data transfers
Put the Access Point states in order of occurrence where the WLC delivers the configuration to the AP.
- WLC discovery and DHCP option 48 - 2 - WLC join - 4 - Access point boots - 1 - Download IOS image and config - 5 - CAPWAP - 3 - Run state - 6
What can cause interference within the wireless network?
- Baby monitors - Cordless phones - Radar - Microwaves - Neighbors
Which of the following are characteristics of a VoIP gateway?
- Billing - Voice and fax compression - Packetization
Identify the bands and channels most used in wireless networking?
- Channel 6 - 5.0 GHz - Channel 11 - Channel 1 - 2.4 GHz
A multimeter can help to ascertain which properties of a cable?
- Continuity - Resistance
Which additional services are inherently available in Azure to enhance the security of your backups to further protect against unauthorized access?
- Encryption - Multi-factor authentication
Which features of a cable would an advanced cable tester be able to determine that a basic tester could not?
- Interference - Attenuation - Resistance
Which options represent the benefits of onsite backup storage compared to offsite?
- No internet access required - Immediate access - Less expensive
A Wi-Fi analyzer can be used to determine which properties of wireless signals?
- Optimal channel use - Signal strength - How often transmission errors are encountered
Which device interface would be required if you wanted to install six hard drives into a server that were all using the same cable?
SCSI
Which statement would best characterize the route that packets will take when using multiprotocol label switching?
Dedicated or specified
A wired network that is implemented in your home or a small office would be most appropriately categorized as which type of network?
PAN
What virtual network topology service has a sandboxed environment?
Platform as a service
An IPS provides what service?
Reads signatures to drop packets that appear to be an attack
For which device would you use a Lighting cable?
iPhone 5
What is the most important reason to engage stakeholders in recovery?
To get their input on recovery prioritization
From a perspective of the cultural impact, which option would generally not be a consideration when attempting to plan a migration to the cloud?
Which provider to use
A multi-layered switch operates over which 2 layers?
2 and 3
Which USB specification introduced a transfer rate of 480 Mbps?
2.0
Which statement best describes a Unified Threat Management device?
An all-in-one security device
Given the small office/home office (SOHO) network topology, what component provides a tunnel through the internet?
VPN
A workgroup is best described in which manner?
A Microsoft implementation of a peer-to-peer network
The 3-2-1 strategy of storing backups means that there should be how many copies in total?
3
In a networking environment with a corporate headquarters, and four branch offices, how many tunnel interfaces would need to be configured at each location so that each branch could connect to the headquarters, and to each other if using multipoint generic routing encapsulation?
5
The typical Cisco hierarchical network model consists of three layers. Which statement best describes the functions performed at the distribution layer?
Acts as the interface between the core and access layers
If a single link between system A and system B were to fail in a full mesh network with 5 nodes, how would it affect overall communications on the network?
All communication among all nodes would still be possible
In which scenario would you be most likely to use a crimper?
Attaching a connector to a cable end
Content filtering uses which primary method to screen objectionable content?
Character strings
Which category of cable would be appropriate for an Ethernet network that requires speeds of up to 10 Gbps over distances of 100 meters?
Cat 6A
Which of the following is a cornerstone of all forensics?
Chain of custody
What architecture used by many small and medium-sized networks eliminates the traditional top tier entirely?
Collapsed Core
Which type of network provider service was available in both asynchronous and synchronous modes?
DSL
A SAN would typically be implemented in which type of networking environment?
Enterprise-level- organization
Where would you configure access control lists in the campus area network?
Firewall
Which device's primary purpose is to divide the network into trusted and untrusted areas?
Firewall
What type of device establishes a barrier between a trusted, secure internal network and another outside network?
Firewalls
Which coaxial cable limitation is best described as power being transmitted by the braided shielding?
Ground loop
A software firewall running on a Windows 10 PC is an example of which type of firewall?
Host-based
What is the first step in incident response?
Identification
What is the most important issue with cyber incident response, after the system is restored to normal operation?
Improve security
Which device is able to stop activity that is considered to be suspicious based on historical traffic patterns?
Intrusion Prevention System
Which statement best characterizes the purpose and functionality of a virtual switch?
It allows virtual machines to communicate with the other systems on the real systems on the real network
What problem arises because of failure to design network architecture with the ability to scale up?
Lack of capacity within a single device
Identify the common reason why an after-action review is not successful.
Not enough information about the incident to make conclusions
Given the small office/ home office (SOHO) network topology, what provides an approved list of accepted devices that can be used?
Policies
In which scenario would you be most likely to use a cable stripper?
Preparing for cable crimping
In which scenario would you be most likely to use a punch down tool?
Pressing individual cable wires down into connections at the back of a patch panel
Which of these mitigating features on a WAF WebACL will look for attackers attempting to modify the back-end database of a front-end web server?
SQL injection
Which type of fiber optic cabling would be most appropriate to use to connect two branch offices that are many miles apart?
Single Mode
What virtual network topology service requires the vendor to control the software and security?
Software as a service
If you have a Full backup from Monday, and Differential backups on Tuesday through Thursday, if a failure occurs on Friday, which backups are required to fully restore all data?
The Full from Monday, and the Differential from Thursday
VoIP phones make use of which transmission media?
The Internet
Which device could be classified as a next generation firewall?
UTM