Lab 6a, 6b, 8a, 8b, 9a

Ace your homework & exams now with Quizwiz!

-Guests -Datacenter -Users

When implementing segmentation as a proactive measure, which of the following types of segments exist on a network? [Choose all that apply] -Demilitarized Zone (DMZ) -Guests -Datacenter -Users

Always On VPN

Which feature of Windows 10 establishes a persistent virtual private network (VPN) connection when there is Internet connectivity? -Persistent VPN -Full VPN -Active VPN -Always On VPN

Choose Your Own Device (CYOD)

Which mobile device management method allows the employee to purchase a mobile device, but the organization has complete control over the device? -Choose Your Own Device (CYOD) -Corporate-Owned, Personally Enabled (COPE) -Corporate-Owned, Business Only (COBO) -Bring Your Own Device (BYOD)

-OTR -TWINE

Which of the following algorithms are examples of lightweight cryptography? [Choose all that apply] -TWINE -ECC -OTR -RSA

-Using an effective right mask -Per-group basis -Per-user basis

Which of the following are ways of configuring access control lists (ACL)? [Choose all that apply] -Making the file read-only -Using an effective right mask -Per-group basis -Per-user basis

DNS poisoning

Which of the following attack is also known as DNS spoofing? -Domain Hijacking -Universal Resource Locator (URL) Redirection -DNS poisoning -DNS Hijacking

Macro

Which of the following can be triggered when a document opens? -Macro -Bash script -Python script -PowerShell script

-CCTV cameras -alarms

Which of the following can be used to detect malicious activities? [Choose all that apply] -CCTV Cameras -Alarms -Signage -Badges

MAC Address

Which of the following is globally unique in the system? -Subnet Mask -Gateway -MAC address -IP address

-An administrator can blacklist or whitelist applications that the users can run using Software Restriction Policies -If an application or a specific path that contains the executables is blacklisted, then all executables within the defined path are blacklisted

Which of the following statements are true for application whitelisting and blacklisting? [Choose all that apply] -An administrator can blacklist or whitelist applications that the users can run using Software Restriction Policies -If an application or a specific path that contains the executables is blacklisted, then all executables within the defined path are blacklisted -Application blacklisting and whitelisting is always applied at the domain level -Software Restriction Policy for restricting applications applies only to an individual user and not to a group of users

-Power-on the network device -Reinstall the operating system -Perform maintenance -Upgrade the firmware -Reboot the network device

Which of the following tasks can be performed using the out-of-band management feature in network devices? [Choose all that apply] -Power-on the network device -Reinstall the operating system -Perform maintenance -Upgrade the firmware -Reboot the network device

Wi-Fi Pineapple

Which of the following tool can be used to automate the setup of an evil twin? -Wi-Fi Apple -Wi-Fi Pineapple -Wi-Fi Orange -Wi-Fi Root

All

Which of the following tools can be used to conduct a Distributed Denial-of-Service (DDoS) attack? [Choose all that apply] -UDP Flooder -Nemesy -HTTP Unbearable Load King (HULK) -DAVOSET

-deterrent -detective

Which of the following type of security control are CCTV cameras? [Choose all that apply] -Deterrent -Detective -Corrective -Preventive

deterrent

Which of the following type of security controls involves installing bollards? -Deterrent -Directive -Detective -Preventive -Corrective

2

How many keys are required in asymmetric encryption? -Depends on the algorithm -1 -3 -2

Firewall

If two segments need to talk to each other in a segmented network, which of the following is required? -IDS -WAF -Firewall -Router

preventive

If you are using a USB data blocker, which type of security control are you using? -Preventive -Detective -Directive -Corrective -Deterrent

-server room -datacenter

In an organization, in which of the following places would you install a fire suppression system? [Choose all that apply] -Cafetaria -Building Entrance -Server Room -Datacenter

The web server sends a certificate to the web browser

In asymmetric key encryption, what is the next step when a client initiates a session with a web server that is configured with a certificate? -The web server decrypts the asymmetric key -The client shares the encrypted key -The web server sends a certificate to the web browser -The client takes the public key from the certificate

-Isolate the attacker -Isolate the affected systems

To prevent the spread of an attack, which of the following methods of isolation can be used? [Choose all that apply] -Isolate the attacker -Isolate the affected systems -Isolate the users -Isolate the network

56

What is the key length of the Data Encryption Standard (DES) algorithm? -128-bit -256-bit -168-bit -56-bit

160

What is the minimum key size in Elliptical Curve Cryptography (ECC)? -160-bits -224-bits -256-bits -384-bits -521-bits

2

What is the minimum number of load balancers needed to configure active/active load balancing? -2 -4 -3 -1


Related study sets

US History Chapter 11 Conspiracy and President Stories

View Set

Wheels in Motion Defensive Driving Exam

View Set

English IV Catcher Test Chapters 1-13

View Set

[Middle Ages, Renaissance, Baroque] in Enjoyment of Music

View Set