Lab 6a, 6b, 8a, 8b, 9a
-Guests -Datacenter -Users
When implementing segmentation as a proactive measure, which of the following types of segments exist on a network? [Choose all that apply] -Demilitarized Zone (DMZ) -Guests -Datacenter -Users
Always On VPN
Which feature of Windows 10 establishes a persistent virtual private network (VPN) connection when there is Internet connectivity? -Persistent VPN -Full VPN -Active VPN -Always On VPN
Choose Your Own Device (CYOD)
Which mobile device management method allows the employee to purchase a mobile device, but the organization has complete control over the device? -Choose Your Own Device (CYOD) -Corporate-Owned, Personally Enabled (COPE) -Corporate-Owned, Business Only (COBO) -Bring Your Own Device (BYOD)
-OTR -TWINE
Which of the following algorithms are examples of lightweight cryptography? [Choose all that apply] -TWINE -ECC -OTR -RSA
-Using an effective right mask -Per-group basis -Per-user basis
Which of the following are ways of configuring access control lists (ACL)? [Choose all that apply] -Making the file read-only -Using an effective right mask -Per-group basis -Per-user basis
DNS poisoning
Which of the following attack is also known as DNS spoofing? -Domain Hijacking -Universal Resource Locator (URL) Redirection -DNS poisoning -DNS Hijacking
Macro
Which of the following can be triggered when a document opens? -Macro -Bash script -Python script -PowerShell script
-CCTV cameras -alarms
Which of the following can be used to detect malicious activities? [Choose all that apply] -CCTV Cameras -Alarms -Signage -Badges
MAC Address
Which of the following is globally unique in the system? -Subnet Mask -Gateway -MAC address -IP address
-An administrator can blacklist or whitelist applications that the users can run using Software Restriction Policies -If an application or a specific path that contains the executables is blacklisted, then all executables within the defined path are blacklisted
Which of the following statements are true for application whitelisting and blacklisting? [Choose all that apply] -An administrator can blacklist or whitelist applications that the users can run using Software Restriction Policies -If an application or a specific path that contains the executables is blacklisted, then all executables within the defined path are blacklisted -Application blacklisting and whitelisting is always applied at the domain level -Software Restriction Policy for restricting applications applies only to an individual user and not to a group of users
-Power-on the network device -Reinstall the operating system -Perform maintenance -Upgrade the firmware -Reboot the network device
Which of the following tasks can be performed using the out-of-band management feature in network devices? [Choose all that apply] -Power-on the network device -Reinstall the operating system -Perform maintenance -Upgrade the firmware -Reboot the network device
Wi-Fi Pineapple
Which of the following tool can be used to automate the setup of an evil twin? -Wi-Fi Apple -Wi-Fi Pineapple -Wi-Fi Orange -Wi-Fi Root
All
Which of the following tools can be used to conduct a Distributed Denial-of-Service (DDoS) attack? [Choose all that apply] -UDP Flooder -Nemesy -HTTP Unbearable Load King (HULK) -DAVOSET
-deterrent -detective
Which of the following type of security control are CCTV cameras? [Choose all that apply] -Deterrent -Detective -Corrective -Preventive
deterrent
Which of the following type of security controls involves installing bollards? -Deterrent -Directive -Detective -Preventive -Corrective
2
How many keys are required in asymmetric encryption? -Depends on the algorithm -1 -3 -2
Firewall
If two segments need to talk to each other in a segmented network, which of the following is required? -IDS -WAF -Firewall -Router
preventive
If you are using a USB data blocker, which type of security control are you using? -Preventive -Detective -Directive -Corrective -Deterrent
-server room -datacenter
In an organization, in which of the following places would you install a fire suppression system? [Choose all that apply] -Cafetaria -Building Entrance -Server Room -Datacenter
The web server sends a certificate to the web browser
In asymmetric key encryption, what is the next step when a client initiates a session with a web server that is configured with a certificate? -The web server decrypts the asymmetric key -The client shares the encrypted key -The web server sends a certificate to the web browser -The client takes the public key from the certificate
-Isolate the attacker -Isolate the affected systems
To prevent the spread of an attack, which of the following methods of isolation can be used? [Choose all that apply] -Isolate the attacker -Isolate the affected systems -Isolate the users -Isolate the network
56
What is the key length of the Data Encryption Standard (DES) algorithm? -128-bit -256-bit -168-bit -56-bit
160
What is the minimum key size in Elliptical Curve Cryptography (ECC)? -160-bits -224-bits -256-bits -384-bits -521-bits
2
What is the minimum number of load balancers needed to configure active/active load balancing? -2 -4 -3 -1