Lesson 1A - Networking Fundamentals

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

Which of the following terms refers to the processing of data such that it can no longer be attributed to a specific data subject without the use of additional information?

Pseudonymization

A risk analyst assigns an impact severity number against each identified risk in an organization's infrastructure. Which of the following analysis methods is the risk analyst using here?

Quantitative Risk Analysis

Which type of RAID is also known as disk striping?

RAID 0

Which of the following protocols enables you to securely manage a remote Windows device?

RDP

Which of the following malware does not harm the system but only targets the data?

Ransomware

Which of the following establishes and confirms the individual's identity, initiates the registration process with Certification Authority (CA), and performs certificate lifecycle management?

Registration Authority

Which of the following are examples of technical control? [Choose Three]

-Firewall -Access Control Lists (ACLs) or Routers

Which of the following is known as out-of-the-box configuration?

. Default settings

Which of the following commands is used to perform xmas tree scan?

. nmap -sX -v <target IP address>

In the context of an 802.11 network, what is the maximum number of access points in a Basic Service Set (BSS)?

1

What is the maximum number of NTP Servers that an NTP client can be synchronized with?

1

Which of the following is a Class C Private IP address?

192.168.0.10

What is the maximum distance supported by Bluetooth 5.x?

200 feet

In a Windows environment, how many passwords does the password history remember by default?

24 passwords

What is the key length of the Data Encryption Standard (DES) algorithm?

56-bit

What is the highest level of normalization that you can achieve with a database?

6NF - Sixth Normal Form

Which of the following wireless standards can transmit data at 1300 Mbps (megabits per second) or 162.5 MBps (megabytes per second)?

802.11ac

Which of the following wireless standards provides a transmission range of 150 feet, is the oldest standard still in use, and is supported by wireless routers?

802.11b

Which of the following protocol uses port-based authentication?

802.1X

Which of the following attack uses CDs, DVDs, or USB drives?

Baiting

Where in a network segment will the DMZ be located?

Between the internal and external network

A password spraying cyber-attack can be categorized as which of the following types of attack?

Brute-force

Which of the following Supervisory Control And data Acquisition (SCADA) components is geographically dispersed and receives commands to perform tasks?

Remote Terminal Unit (RTU)

Which of the following methods ensures quick switchover to a replicated virtual machine in case of failure of the operating virtual machine?

Replication

When executing the tracert 192.168.0.10 command, what can be determined from the output?

Route the command takes to reach the destination IP address

in the context of networking, based on which of the following does an L3 device forward a data packet?

Routing table

Which service needs to be configured to ensure metrics for network devices can be captured?

SNMP

Which of the following is used to target SSL-enabled sessions and non-SSL-enabled links to sniff their contents?

SSL strip

Which of the following media is used by Airlines to provide internet services to customers in transit?

Satellite

Which of the following statements is true for the scalability of a system?

Scalability adds resources to meet statically increasing workload demand on a system

Which of the following monitors system logs continuously?

Security Information and Event Management (SIEM)

Which of the following connection methods is used to connect geographically distributed offices of an organization?

Site-to-Site VPN

Which of the following type of virtual machine backup enables you to restore a virtual machine to a specific point in time?

Snapshot

In which of the following types of attack is the user misled into revealing personal information by a caller posing as a person in authority?

Social Engineering

Which of the following network topology has a single point of failure? [Choose Two]

Star and Bus

In a Syslog implementation, which of the following components collects the information from various devices and servers on the network?

Syslog Forwarder

Which of the following protocols was introduced with Wi-Fi Protected Access (WPA)?

Temporal Key Integrity Protocol (TKIP)

The OWASP Top 10 is a standard listing the most critical security risks to web applications.

True

How many keys are required in asymmetric encryption? Select one:

Two

Multi-factor authentication involves a minimum of how many methods to authenticate a user?

Two

What is the minimum number of load balancers needed to configure active/active load balancing?

Two

Which of the following transport protocol/ports do DNS and DHCP respectively use?

UDP 53 / UDP 67 and 68

A USB can be used to drop which of the following types of malware?

-Backdoor -Trojan -Keyboard loggers -Worms

Which of the following types of attack is a precursor to the collision attack?

Birthday

Volatile memory used to hold instructions and data of currently running programs is called __________.

RAM

Network Layer (Layer 3)

Which layer of the OSI Model is concerned with logical addressing? Select one:

Network

Which layer of the OSI model is used to forward packets on the network?

Transport

Which of the following OSI layers is responsible for establishing connections between two devices?

Campus-area Network (CAN)

Which of the following is a computer network in a defined area that links buildings and consists of multiple LANs within that limited geographical area?

Processing and converting of data

Which of the following is a function of the Presentation layer of the OSI model?

00:D0:59:09:07:51 ie: 0-9, A-F and 12 characters

Which of the following is a valid MAC address?

RJ-11

Which type of connector should be used to plug a telephone into the wall and the handset into the telephone?

Which of the following tools can be used to automate the setup of an evil twin? Select one:

Wi-Fi Pineapple

Which of the following should be mentioned by a network diagram?

-Devices present on the network -IP addresses and names of the devices -Names of users using the devices -Connectivity between the devices

Which of the following commands can be used to refresh the DNS records on a host device?

<pre><code class="language-powershell">ipconfig /registerdns</code></pre>

Malware can be delivered through which of the following?

-Email attachment -Website -USB

Which of the following parameter can be used with the ping command to send a constant stream of packets to check the availability of a Windows device?

-t

Which of the following types of phishing targets specific individuals and companies?

. Spear phishing

When configuring a server for a failover cluster, what needs to be validated before adding the server to the cluster?

- The server has a network interface card configured the same as the other servers in the cluster - The server has the same roles installed as other servers in the cluster - The hard drives of the server are similarly configured as the cluster

Which of the following are the phases in Open Source Intelligence (OSINT)?

-Source identification -Data harvesting -Data processing -Data analysis

Which of the following statements describes the function of a Trusted Platform Module (TPM)?

-Storage of encryption keys -Management of encryption keys -Perform encryption and decryption process

Which of the following standards is the most used for data communication in a Local Area Network (LAN)

802.3

Which of the following can be determined using a Wi-Fi Analyzer?

- Available wireless access points - Signal strength of a wireless access point - Frequency of a wireless access point

Which of the following are ways to configure access control lists (ACLs)?

- Per-user basis - Using an effective right mask - Per-group basis

In an organizational network diagram, which of the following entities should be documented?

- Servers - Client servers - VoIP phones - WAN links

A strong hashing algorithm can be computed over a partial message.

False

Domain is always the root in the Active Directory hierarchy.

False

Publicly Inspectable Information (PII) can identify an individual's race, name, social security number, date and place of birth, biometric, medical, financial, or employment status.

False

The OWASP Top 10 is a dynamic document, regularly updated by NIST.

False

When a client requests a certificate, Certificate Authority (CA) validates the request.

False /// Registration Authority (RA) validates the request?

Which of the following terms describes the condition that shows the measured parameter being present while, in reality, it is not present?

False positive

Implementing which of the following elements can help secure your databases?

Firewall Encryption Multi-factor authentication Physical locks

Which of the following codes provides instructions to a hardware device?

Firmware

Which of the following are benefits of a Wireless LAN Controller? [Choose Four]

Flexible deployment of a wireless access point Wireless access point status detection Correct Simplified wireless network maintenance Correct Detection of any Interference to network

Which of the following switching features manages frame drop in case of data congestion by pausing sending frames?

Flow control

What is the purpose of documenting an incident?

For future reference

Which of the following standards/laws focuses on protecting financial, nonpublic information?

GRAMM-LEACH-BILLEY ACT (GLBA)

Which of the following allows you to add geographical information to media such as photographs?

Geofencing

Which of the following can be triggered when a document opens?

Macro

Which of the following cyber attacks cannot render a network device inaccessible?

Man-in-the-Middle attack

Which of the following method of threat hunting enables you to disrupt, deny, destroy, and degrade third-party data?

Maneuvering

Which of the following is a best practice to secure empty ports on switches in a network?

Move the ports from the default VLAN to a new, unused VLAN then disable them

Which of the following describes multipathing on a network?

Multipathing is the ability of a server to communicate with the same physical or logical block storage device across multiple physical paths between the host bus adapters in the server and the storage controllers for the device

Which of the following nmap commands is used for file-exclusion?

nmap -iL /tmp/scanlist.txt --excludefile /tmp/exclude.txt

Which of the following commands is used to detect OS on a target?

nmap -o <ip address>

Which of the following commands can be used to display the local routing table on a Windows device?

route print

Which of the following statements about Network-based Intrusion Prevention System (NIPS) and Network-based Intrusion Detection System (NIDS) is true?

A false malicious signal on NIPS is more damaging to the system than a similar false signal on NIDS

Which DNS record needs to be configured for a network load balancing cluster?

An A record

Client-server

An organization requires the use of a central computer to collect and distribute emails to networked devices inside the organization. The central computer will deliver emails through SMTP using port 465. Which of the following network types is most suitable in this case?

You receive a call from a person who claims to be from a law firm. The caller wants to know some confidential information about your organization. Which of the following social engineering methods is the person using?

Authority

Implementing an additional DNS server on a network ensures which of the following?

Availability of the DNS server becomes high

When implementing an organized cable management solution, which of the following is not required to help keep the system organized?

Cable ties

Which of the following standards provides guidelines for hardening a webserver? Select one:

Center for Internet Security (CIS)

A trusted third-party responsible for issue and maintenance of Digital Certificates is called a __________.

Certificate Authority

In a version control system, a developer checks out the code, updates it, and checks it back in. Which of the following description needs to be documented with each check in?

Changes made to update the code

Validation involves ___________.

Checking whether the specification captures the customer's requirements

Which of the following mobile device management methods allows the employee to purchase a mobile device but gives the organization complete control over the device?

Choose Your Own Device (CYOD)

Which of the following provides services, maintains the infrastructure, and provides security in a cloud environment?

Cloud Service Provider

In the network security triad, what do the letters in the acronym CIA represent? [Choose Three]

Confidentiality, integrity, and availability

Which tier in the three-tiered network is responsible for routing traffic in and out of a network?

Core

Which of the following relates to the term Data Sovereignty?

Country specific laws and regulations

Which of the following features, when enabled without detailed configuration on a DHCP server, can treat all the ports on the server as untrusted?

DHCP Snooping

Which of the following role delegates day-to-day maintenance to the data custodian?

Data owner

Which of the following types of security controls involves installing bollards?

Deterrent

In which of the following types of software environments are you most likely to find Microsoft Visual Studio and Eclipse?

Development

Which of the following provides online backup storage?

Disk shadowing

When you create a user in a domain, to which of the following groups is the user added by default?

Domain Users

Which of the following routes has an Administrative distance of 90 in a routing table?

EIGRP routes

Integrated Product Team (IPT) is a multi-disciplinary team involving representatives of various stakeholders of the project. Which of the following is true for this team?

Each member of the team plays a prominent role only during the relevant development phase of the project

Which of the following is defined as the loss in percentage an organization is likely to suffer if a risk materializes?

Exposure Factor (EF)

You create an access list on your router to filter specific IP addresses and ports. You create the relevant entries with the permit and the deny statements. However, you miss to add one specific deny statement to filter traffic from host A. How will this traffic be treated?

Host A traffic will be denied because, at the end of every access list, there is an implicit deny statement

Which of the following Microsoft technologies is used to create virtual devices on a physical device on-premise?

Hyper-V

Which of the following is the first step to be taken when troubleshooting a network incident?

Identify the problem

When using CDMA, where is the cellular-related information stored?

In the handset

In which of the following types of cloud configuration is the customer responsible for maintaining the operating system and software on the virtual machines?

Infrastructure as a Service (IaaS)

Your network is configured for high speed environment of up to 40 Gbps, with default MTU. However, users in the network are experiencing slow performance issues on some applications. Which of the following do you enable on the network equipment to improve the performance?

Jumbo frames

Which of the following protocols do you use to integrate firewall directly with Active Directory on a network?

LDAP

Which of the following can be used to detect if a Trojan has infected a system?

Netstat

Which of the following is an open source toolkit used to implement the SSLv3 and TLS v1 protocols?

OpenSSL

Which of the following is a firmware driver used by Unified Extensible Firmware Interface (UEFI)?

Option ROM

A server needs to be added to a failover cluster, and a virtual switch needs to be created using Hyper-V Manager. The other server in the cluster has a preconfigured virtual switch named - PLCluster. What must be the name of the virtual switch that needs to be created?

PLCluster

Which of the following team is dedicated only to incident response?

Permanent team

Which of the following development phases is the most preferred to identify and fix security bugs in a software?

Planning

You want to improve the security in your network and enable MAC address filtering. Which of the following features will you configure on the switch ports?

Port security

After installation of the DHCP server role, why is it necessary to restart the DHCP service?

To ensure the credentials stipulated are applied

Which of the following replaces a string of data with unique identification symbols or numbers? Select one:

Tokenization

A secure software development lifecycle (SDLC) weaves security testing into the existing SDLC.

True

Database-as-a-service solution is an example of Platform as a Service (PaaS).

True

Developers protect their code by using self-signed digital certificates.

True

Legal hold is the temporary condition that deals with preserving records, both hard copy as well as digital, related to an upcoming litigation.

True

Machine Learning (ML) is a subset of Artificial Intelligence (AI).

True

You are the network administrator for an organization. The organization has strict rules implemented for printer access. In the organization, one of the users is unable to access the printer but has access to the internet. To begin resolving this issue, which of the following do you first check on your switch?

VLAN assignments

Which type of incident response team is made up of experts who have other duties?

Virtual team

Which type of phishing is conducted over the Voice over IP (VoIP) lines where the attacker pretends to be a authorized caller from a bank or a financial institution?

Vishing

Which of the following do you protect by implementing Secure Real-Time Protocol (SRTP)?

Voice Over Internet Protocol (VoIP)

In which of the following types of attack does the attacker infect a website that is often visited by the target users?

Watering hole

Router

What device is a Layer 3 device that is used to make forwarding decisions based on a Layer 3 address?

It is encapsulated with a header at the beginning and a trailer at the end

What happens to data as it moves from the upper to the lower layers of the OSI model on a host system?

Broadcast

Which address type sends data to all systems on a subnet or network instead of to single hosts?

Star Topology

You are responsible for installing a new wired network that allows for network expansion with the least amount of disruption for the current network users. Which of the following network topologies would you choose?

Peer-to-Peer

a decentralized platform whereby two individuals interact directly with each other, without intermediation by a third party.


Kaugnay na mga set ng pag-aaral

Chapter 8 - Appendicular Skeleton

View Set

Drivers Ed: Level 1 - Chapter 6 (Drive Responsibly)

View Set