unit 3
A network with a CIDR notation of /26 would have what subnet mask?
255.255.255.192
How many subnets can a /48 site prefix support?
65,536 subnets
When using public and private keys to connect to an SSH server from a Linux device, where must your public key be placed before you can connect?
Polymorphic malware can change its characteristics every time it is transferred to a new system.
What cloud service model involves providing applications through an online user interface, providing for compatibility with a multitude of different operating systems and devices?
SaaS
Which of the following utilities performs sophisticated vulnerability scans, and can identify unencrypted data such as credit card numbers?
nessus
The concept of giving employees and contractors only enough access and privileges to do their jobs is known by what term
principal of least privilege.
If someone is offered a free gift or service in exchange for private information or access to a computer system, what type of social engineering is taking place?
quid pro quo
On a Linux based system, what command can you use to create a hash of a file using SHA-256?
sha256sum
Digital certificates are issued, maintained, and validated by an organization called a certificate authority (CA)
true
When using a site-to-site VPN, what type of device sits at the edge of the LAN and establishes the connection between sites?
vpn gateway
Which of the following suggestions can help prevent VLAN hopping attacks on a network
Disable auto trunking and move native VLANs to unused VLANs.
Which statement regarding the IKEv2 tunneling protocol is accurate?
IKEv2 offers fast throughput and good stability when moving between wireless hotspots.
A person posing as an employee strikes up a conversation with a legitimate employee as they walk into a secured area, in an attempt to gain access. What kind of social engineering is this?
It is inserted between the source address and the Ethernet type field
When is it appropriate to utilize the NAT network connection type?
Whenever the VM does not need to be access at a known address by other network nodes.
Which of the following scenarios would necessitate the use of a non-disclosure agreement?
Your company needs to prevent a new contractor from sharing information with a potential competitor.
What is NOT one of the ways in which networks are commonly segmented
by device manufacturer
a hacker, in the original sense of the word, is someone with technical skill and malicious intent
false
A Type 2 hypervisor installs on a computer before any OS, and is therefore called a bare-metal hypervisor.
false