Practice exam questions

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Which of the choices listed below would allow for setting up three Wireless Access Points (WAPs) on non-overlapping channels?

1, 6, 11

The IEEE 802.11ac standard specifies a maximum channel bandwidth of up to:

160 MHz

Which of the following answers refers to the IEEE 802.11ax maximum channel bandwidth?

160 MHz

Which of the following answers refer to the IEEE 802.11b wireless standard? (Select 3 answers)

2.4 GHz frequency range Maximum data signaling rate of 11 mbps Carrier Sense Multiple Access / Collision Avoidance (CSMA/CA) network access method

The IEEE 802.11a standard specifies a channel bandwidth of

20 MHz

The IEEE 802.11g standard specifies a channel bandwidth of:

20 MHz

The IEEE 802.11n standard specifies available channel bandwidth options of: (Select 2 answers)

20 MHz 40 MHz

Which of the answers listed below refers to a channel bandwidth used in 802.11b networks?

22 MHz

Frequency bands used by 802.11 networks include:

5.0 GHz 2.4 GHz

Which of the following describes a man-in-the-middle attack?

A false server intercepts communications from a client by impersonating the intended server

Reports on a user's access and logs of successful and unsuccessful connection attempts are which part of AAA?

Accounting

Sue is inspecting her application logs and finds log records that indicate attackers may be attempting to use SQL injection attacks to access the database underlying her application. What is the most effective security control that Sue can apply to address this risk?

Application layer firewall

What are the two states of data?

At rest In-transit

With regards to AAA, _______ confirms that the user is how he or she claims to be.

Authentication

Kim has taken her Network and Security Foundation exam and is waiting to get her results by email. By accident, Kim's results are sent to Karen. What part of the CIA Triad is affected?

Authorization

With regards to AAA, ________ defines what the user can access and in what manner.

Authorization

Cynthia is working on her Western Governors University application online, when the admissions website crashes. She is unable to turn in her application on time. What part of the CIA Triad is affected?

Availability

In the OSI model, the physical layer PDU is known as:

Bit

Which of the following threat actors seeks to defame, shed light on, or cripple an organization or government?

Black hat

Gary is participating in a cybersecurity exercise. His job is to defend the network against attack. What role is Gary playing?

Blue team

Bob receives a message from Alice that she sent using an asymmetric cryptography algorithm. What key should he use to decrypt the message?

Bob's private key

Alice would like to send a message to Bob using an asymmetric cryptography algorithm. What key should she use to encrypt the message?

Bob's public key

Which of the following topologies connects all devices to a single cable?

Bus

You want to install a firewall that can reject packets that are not part of an active session. Which type of firewall should you use?

Circuit-level

In cybersecurity, what does CIA stand for?

Confidentiality, Integrity, Availability

Layer 2 of the OSI model is also referred to as:

Data Link Layer

In a hybrid cloud, data is traveling over the wide area network (WAN) connection between the private and public clouds is known as?

Data in transit

Your company purchases a new bridge that filters packets based on the MAC address of the destination computer. On which layer of the OSI model is this device functioning?

Data link

Which two layers of the OSI model are the same as the first layer of the TCP/IP model?

Data link, physical

In the OSI model, the layer 4 UDP PDU is called:

Datagram

A wireless deauthentication attack is an example of which type of attack?

Denial of Service attack

Which attack floods a system with traffic in order to prevent legitimate activities or transactions from occurring?

Denial of service attack

In the context of the OSI model, the term "Data encapsulation" is used to describe a process where each layer of the OSI model adds its own control information to the original data that is being passed across the layers from the physical layer up to the application layer.

False

User Datagram Protocol (UDP) is a connection-oriented protocol using a three-way handshake which is a set of initial steps required for establishing network connection. UDP supports retransmission of lost packets, flow control (managing the amount of data that is being sent), and sequencing (rearranging packets that arrived out of order). Example applications of UDP include transmission of text and image data.

False

Tom would like to protect against an intruder tapping his network cable. Which cable provides the best protection against this type of attack?

Fiber

Which of the following protocols reside(s) at the application layer of the OSI model? (Select all that apply)

HTTP, FTP, SMTP

Kyle is concerned that an attacker is probing his network and would like to use a decoy system to attract the attacker and analyze his or her activity. What type of tool would best meet Kyle's needs?

Honeypot

Which of the following hardware devices forwards a signal out all connected ports without examining the frame or packet contents?

Hub

Which of the following reside at the physical layer of the OSI model? (Select 3 answers)

Hub, Network cabling, repeater

A company is concerned with traffic that flows through the network. There is a concern that there may be malware that exists that is not being blocked or eradicated by antivirus. What technology can be put in place to detect potential malware traffic on the network?

IDS

What is the name of a network layer protocol that specifies the format of packets and addressing scheme in network communications?

IP

The restrictions most commonly implemented in packet-filtering firewalls are based on ____.

IP source and destination address Direction (inbound or outbound) TCP or UDP source and destination port requests

You were recently hired by a small start-up company. The company has no plans to setup their own datacenter. You have been asked to find a cloud service that would provide several physical servers or virtual machines that the company would be able to install whatever operating systems and applications they need. Which cloud service model should you use?

IaaS

Which of the following are examples of social engineering?

Impersonation, phishing

Which network is this? I allow computers to communicate with each other in the same building

LAN

Physical layer of the OSI model is also known as:

Layer 1

Which of the following terms refers to the OSI network layer?

Layer 3

Which of the following answers does not refer to the OSI TCP segment header?

Layer 3 header

Which of the following answers does not refer to the OSI UDP datagram header?

Layer 3 header

The term "Presentation layer" refers to:

Layer 6 of the OSI model

The application layer of the OSI model is also known as:

Layer 7

What are the characteristic components of the OSI data link layer? (Select 3 answers)

MAC Address, network switch, ethernet frame

A switch forwards data only to the port that are connected to the destination device. It knows which port to forward it to based on which value?

MAC address

A limit on the maximum amount of data that can be transmitted over a network without fragmentation is referred to as:

MTU

Which of the answers listed below refer to the characteristic features of the IEEE 802.11a wireless standard? (Select 3 answers)

Maximum data signaling rate of 54 mbps 5.0 GHz frequency band Carrier Sense Multiple Access / Collision Avoidance (CSMA/CA) network access method

What are the characteristics of the IEEE 802.11g wireless standard? (Select 3 answers)

Maximum data signaling rate of 54 mbps Carrier Sense Multiple Access / Collision Avoidance (CSMA/CA) network access method 2.4 GHz frequency range

Your manager has asked you to implement a wired network infrastructure that will accommodate failed connections. Which of the following network topologies should you implement?

Mesh

Which of the following geographic network types are typically contained within city or county limits?

Metropolitan Area Network (MAN)

Which of the following answers refers to the new feature introduced with the IEEE 802.11ac standard?

Multi-User MIMO (MU-MIMO)

The characteristic features of the IEEE 802.11n (WiFi 4) wireless standard include: (Select all that apply)

Multiple Input / Multiple Output (MIMO) 2.4 GHz frequency band 5.0 GHz frequency band Maximum data signaling rate of up to 600 mbps Carrier Sense Multiple Access / Collision Avoidance (CSMA/CA) network access method

Tom would like to determine what network ports are open on a newly commissioned server. Which one of the following tools is best suited for that task?

Nmap

What should we be concerned with keeping up to date?

Office suites, browser plugins, anti-virus

You have implemented a network where each device provides all other devices on the network with access to shared files. What type of network do you have?

Peer-to-peer

Data format translation, data compression, and data encryption/decryption take place at the:

Presentation layer of the OSI model

Which of the following describes a private cloud?

Provides cloud services to a single organization

Which of the following describes a public cloud?

Provides cloud services to just about anyone

Amazon Web Services, Microsoft Azure, and Google Cloud Platform are responsible for the physical data center security and most the physical hardware security concerns in which cloud deployment?

Public Cloud

If it detects a threat, an IPS can

Record the details of the threat, report the threat to security admins, take preventative action to stop the threat

Which of the following topologies connects each device to a neighboring device?

Ring

Which of the following strategies involves sharing some of the risk burden with someone else, such as an insurance company?

Risk transference

Which of the following answers refer to the OSI network layer components?

Router, IP address, Packet

In the OSI model, what is the primary function of the Network layer?

Routes data between networks

In what type of attack does the attacker attempt to send unauthorized commands to a back-end database through a web application?

SQL Injection

What type of attack targets a SQL database using the input field of a user?

SQL injection

Nancy is responsible for the administration of many different servers in her company. Which one of the following commands can she use to gain command-line administrative access to her Linux servers in a secure manner?

SSH

Which of the following TCP flags are used for establishing a network connection via TCP three-way handshake? (Select 2 answers)

SYN, ACK

Which of the following cloud computing solutions will deliver software applications to a client either over the internet or on a local area network?

SaaS

Which layer of the OSI model is responsible for the establishment, maintaining and terminating the connection between two systems?

Session

Layer 5 of the OSI model is also referred to as:

Session Layer

Which OSI layer assumes the responsibility for opening, closing, and maintaining connections between applications?

Session layer

Authentication and authorization take place at the:

Session layer of the OSI model

Which of the following answers refer to examples of network layer header data? (Select 2 answers)

Source IP address, Destination IP address

Which of the following answers refer to the OSI layer 2 header data? (Select 2 answers)

Source MAC address, Destination MAC address

You have a small network that uses a switch to connect multiple devices. Which physical topology are you using?

Star

Which of the answers listed below refers to a data link layer device designed to forward frames between network segments?

Switch

What encryption algorithm uses the same pre-shared key to encrypt and decrypt data?

Symmetric

Which of the following are transport layer protocols?

TCP and UDP

Brian would like to secure his website. Which one of the following protocols is the best choice for encrypting communication between a website and its users?

TLS

Layer 4 of the OSI model is also known as:

Transport Layer

Encryption of data at rest provides an additional layer of protection by keeping data protected and inaccessible to the attacker if even the system is physically stolen.

True

In the OSI model, the payload data (a.k.a. user data) is the actual data that is being nested between header and tail control information.

True

Multiple Input / Multiple Output (MIMO) is a wireless technology that allows for significant increase in data throughput due to the use of multiple antennas and multiple data streams.

True

The term "Channel bonding" refers to a technique that allows for combining adjacent wireless channels to increase the amount of available bandwidth.

True

Barry is working with his organization's platforms team to select a virtualization approach for use in their data center. To provide stronger security, he would like to select a hypervisor that runs directly on bare metal hardware without an intervening host operating system. What type of hypervisor should he choose?

Type 1

James is working with his organization's platforms team to select a virtualization approach for use on test systems managed by developers. He is looking for a hypervisor that can run on top of the Windows operating system already installed on their laptops. What type of hypervisor is James looking for?

Type 2

Which of the protocols listed below reside at the OSI transport layer? (Select 2 answers)

UDP, TCP

What are two ways to protect a computer from malware?

Use antivirus software Keep software up to date

Two or more computers connected together over a wide geographical area (e.g. county, country, globe). What type of network is this?

WAN

Which of the following wireless security protocols has been discouraged in favor of newer standards due to known vulnerabilities resulting from implementation flaws?

WEP

Which one of the following wireless encryption protocols is considered the weakest and recommended to no longer use?

WEP

Which of the following would provide the most effective security for a small wireless network?

WPA2

A cybersecurity specialist is asked to identify the potential criminals known to attack the organization. Which type of hackers would the cybersecurity specialist be least concerned with?

White hat hackers

In a private cloud companies such as Amazon Web Services, Microsoft Azure, and Google Cloud Platform are responsible for the physical data center security concerns.

false

Transmission Control Protocol (TCP) is an example of a connectionless protocol. Because TCP does not support three-way handshake while establishing a network connection, it is referred to as unreliable or best-effort protocol. Example applications of TCP include transmission of video and audio streaming data.

false

In the OSI model, the layer 2 PDU is called:

frame

Diana is investigating suspicious software installed on a machine and would like to identify any network connections made by that machine. Which one of the following tools can best assist her with this task by running it on the target machine?

netstat

In the OSI model, the layer 3 PDU is known as:

packet

Starting at layer 1 and going to layer 7, what are the layers of the OSI model?

physical, data link, network, transport, session, presentation, application

In the OSI model, the layer 4 TCP PDU is known as:

segment

Which type of fiber cable is normally used to connect two buildings that are several miles apart?

single-mode


Set pelajaran terkait

Chapter 34: The Child with Musculoskeletal or Articular Dysfunction

View Set

ITALIAN CULTURE THROUGH MUSIC MIDTERM

View Set

EMT Pocket Prep: SIGW w/explanations

View Set

FI 305 Morosan - Chapters 9 & 10

View Set

Chapter 3 Energy, Chemical Reactions, and Cellular Respiration

View Set

Chapter 37 Introduction to Forms of Business and Formation of Partnerships

View Set