Practice exam questions
Which of the choices listed below would allow for setting up three Wireless Access Points (WAPs) on non-overlapping channels?
1, 6, 11
The IEEE 802.11ac standard specifies a maximum channel bandwidth of up to:
160 MHz
Which of the following answers refers to the IEEE 802.11ax maximum channel bandwidth?
160 MHz
Which of the following answers refer to the IEEE 802.11b wireless standard? (Select 3 answers)
2.4 GHz frequency range Maximum data signaling rate of 11 mbps Carrier Sense Multiple Access / Collision Avoidance (CSMA/CA) network access method
The IEEE 802.11a standard specifies a channel bandwidth of
20 MHz
The IEEE 802.11g standard specifies a channel bandwidth of:
20 MHz
The IEEE 802.11n standard specifies available channel bandwidth options of: (Select 2 answers)
20 MHz 40 MHz
Which of the answers listed below refers to a channel bandwidth used in 802.11b networks?
22 MHz
Frequency bands used by 802.11 networks include:
5.0 GHz 2.4 GHz
Which of the following describes a man-in-the-middle attack?
A false server intercepts communications from a client by impersonating the intended server
Reports on a user's access and logs of successful and unsuccessful connection attempts are which part of AAA?
Accounting
Sue is inspecting her application logs and finds log records that indicate attackers may be attempting to use SQL injection attacks to access the database underlying her application. What is the most effective security control that Sue can apply to address this risk?
Application layer firewall
What are the two states of data?
At rest In-transit
With regards to AAA, _______ confirms that the user is how he or she claims to be.
Authentication
Kim has taken her Network and Security Foundation exam and is waiting to get her results by email. By accident, Kim's results are sent to Karen. What part of the CIA Triad is affected?
Authorization
With regards to AAA, ________ defines what the user can access and in what manner.
Authorization
Cynthia is working on her Western Governors University application online, when the admissions website crashes. She is unable to turn in her application on time. What part of the CIA Triad is affected?
Availability
In the OSI model, the physical layer PDU is known as:
Bit
Which of the following threat actors seeks to defame, shed light on, or cripple an organization or government?
Black hat
Gary is participating in a cybersecurity exercise. His job is to defend the network against attack. What role is Gary playing?
Blue team
Bob receives a message from Alice that she sent using an asymmetric cryptography algorithm. What key should he use to decrypt the message?
Bob's private key
Alice would like to send a message to Bob using an asymmetric cryptography algorithm. What key should she use to encrypt the message?
Bob's public key
Which of the following topologies connects all devices to a single cable?
Bus
You want to install a firewall that can reject packets that are not part of an active session. Which type of firewall should you use?
Circuit-level
In cybersecurity, what does CIA stand for?
Confidentiality, Integrity, Availability
Layer 2 of the OSI model is also referred to as:
Data Link Layer
In a hybrid cloud, data is traveling over the wide area network (WAN) connection between the private and public clouds is known as?
Data in transit
Your company purchases a new bridge that filters packets based on the MAC address of the destination computer. On which layer of the OSI model is this device functioning?
Data link
Which two layers of the OSI model are the same as the first layer of the TCP/IP model?
Data link, physical
In the OSI model, the layer 4 UDP PDU is called:
Datagram
A wireless deauthentication attack is an example of which type of attack?
Denial of Service attack
Which attack floods a system with traffic in order to prevent legitimate activities or transactions from occurring?
Denial of service attack
In the context of the OSI model, the term "Data encapsulation" is used to describe a process where each layer of the OSI model adds its own control information to the original data that is being passed across the layers from the physical layer up to the application layer.
False
User Datagram Protocol (UDP) is a connection-oriented protocol using a three-way handshake which is a set of initial steps required for establishing network connection. UDP supports retransmission of lost packets, flow control (managing the amount of data that is being sent), and sequencing (rearranging packets that arrived out of order). Example applications of UDP include transmission of text and image data.
False
Tom would like to protect against an intruder tapping his network cable. Which cable provides the best protection against this type of attack?
Fiber
Which of the following protocols reside(s) at the application layer of the OSI model? (Select all that apply)
HTTP, FTP, SMTP
Kyle is concerned that an attacker is probing his network and would like to use a decoy system to attract the attacker and analyze his or her activity. What type of tool would best meet Kyle's needs?
Honeypot
Which of the following hardware devices forwards a signal out all connected ports without examining the frame or packet contents?
Hub
Which of the following reside at the physical layer of the OSI model? (Select 3 answers)
Hub, Network cabling, repeater
A company is concerned with traffic that flows through the network. There is a concern that there may be malware that exists that is not being blocked or eradicated by antivirus. What technology can be put in place to detect potential malware traffic on the network?
IDS
What is the name of a network layer protocol that specifies the format of packets and addressing scheme in network communications?
IP
The restrictions most commonly implemented in packet-filtering firewalls are based on ____.
IP source and destination address Direction (inbound or outbound) TCP or UDP source and destination port requests
You were recently hired by a small start-up company. The company has no plans to setup their own datacenter. You have been asked to find a cloud service that would provide several physical servers or virtual machines that the company would be able to install whatever operating systems and applications they need. Which cloud service model should you use?
IaaS
Which of the following are examples of social engineering?
Impersonation, phishing
Which network is this? I allow computers to communicate with each other in the same building
LAN
Physical layer of the OSI model is also known as:
Layer 1
Which of the following terms refers to the OSI network layer?
Layer 3
Which of the following answers does not refer to the OSI TCP segment header?
Layer 3 header
Which of the following answers does not refer to the OSI UDP datagram header?
Layer 3 header
The term "Presentation layer" refers to:
Layer 6 of the OSI model
The application layer of the OSI model is also known as:
Layer 7
What are the characteristic components of the OSI data link layer? (Select 3 answers)
MAC Address, network switch, ethernet frame
A switch forwards data only to the port that are connected to the destination device. It knows which port to forward it to based on which value?
MAC address
A limit on the maximum amount of data that can be transmitted over a network without fragmentation is referred to as:
MTU
Which of the answers listed below refer to the characteristic features of the IEEE 802.11a wireless standard? (Select 3 answers)
Maximum data signaling rate of 54 mbps 5.0 GHz frequency band Carrier Sense Multiple Access / Collision Avoidance (CSMA/CA) network access method
What are the characteristics of the IEEE 802.11g wireless standard? (Select 3 answers)
Maximum data signaling rate of 54 mbps Carrier Sense Multiple Access / Collision Avoidance (CSMA/CA) network access method 2.4 GHz frequency range
Your manager has asked you to implement a wired network infrastructure that will accommodate failed connections. Which of the following network topologies should you implement?
Mesh
Which of the following geographic network types are typically contained within city or county limits?
Metropolitan Area Network (MAN)
Which of the following answers refers to the new feature introduced with the IEEE 802.11ac standard?
Multi-User MIMO (MU-MIMO)
The characteristic features of the IEEE 802.11n (WiFi 4) wireless standard include: (Select all that apply)
Multiple Input / Multiple Output (MIMO) 2.4 GHz frequency band 5.0 GHz frequency band Maximum data signaling rate of up to 600 mbps Carrier Sense Multiple Access / Collision Avoidance (CSMA/CA) network access method
Tom would like to determine what network ports are open on a newly commissioned server. Which one of the following tools is best suited for that task?
Nmap
What should we be concerned with keeping up to date?
Office suites, browser plugins, anti-virus
You have implemented a network where each device provides all other devices on the network with access to shared files. What type of network do you have?
Peer-to-peer
Data format translation, data compression, and data encryption/decryption take place at the:
Presentation layer of the OSI model
Which of the following describes a private cloud?
Provides cloud services to a single organization
Which of the following describes a public cloud?
Provides cloud services to just about anyone
Amazon Web Services, Microsoft Azure, and Google Cloud Platform are responsible for the physical data center security and most the physical hardware security concerns in which cloud deployment?
Public Cloud
If it detects a threat, an IPS can
Record the details of the threat, report the threat to security admins, take preventative action to stop the threat
Which of the following topologies connects each device to a neighboring device?
Ring
Which of the following strategies involves sharing some of the risk burden with someone else, such as an insurance company?
Risk transference
Which of the following answers refer to the OSI network layer components?
Router, IP address, Packet
In the OSI model, what is the primary function of the Network layer?
Routes data between networks
In what type of attack does the attacker attempt to send unauthorized commands to a back-end database through a web application?
SQL Injection
What type of attack targets a SQL database using the input field of a user?
SQL injection
Nancy is responsible for the administration of many different servers in her company. Which one of the following commands can she use to gain command-line administrative access to her Linux servers in a secure manner?
SSH
Which of the following TCP flags are used for establishing a network connection via TCP three-way handshake? (Select 2 answers)
SYN, ACK
Which of the following cloud computing solutions will deliver software applications to a client either over the internet or on a local area network?
SaaS
Which layer of the OSI model is responsible for the establishment, maintaining and terminating the connection between two systems?
Session
Layer 5 of the OSI model is also referred to as:
Session Layer
Which OSI layer assumes the responsibility for opening, closing, and maintaining connections between applications?
Session layer
Authentication and authorization take place at the:
Session layer of the OSI model
Which of the following answers refer to examples of network layer header data? (Select 2 answers)
Source IP address, Destination IP address
Which of the following answers refer to the OSI layer 2 header data? (Select 2 answers)
Source MAC address, Destination MAC address
You have a small network that uses a switch to connect multiple devices. Which physical topology are you using?
Star
Which of the answers listed below refers to a data link layer device designed to forward frames between network segments?
Switch
What encryption algorithm uses the same pre-shared key to encrypt and decrypt data?
Symmetric
Which of the following are transport layer protocols?
TCP and UDP
Brian would like to secure his website. Which one of the following protocols is the best choice for encrypting communication between a website and its users?
TLS
Layer 4 of the OSI model is also known as:
Transport Layer
Encryption of data at rest provides an additional layer of protection by keeping data protected and inaccessible to the attacker if even the system is physically stolen.
True
In the OSI model, the payload data (a.k.a. user data) is the actual data that is being nested between header and tail control information.
True
Multiple Input / Multiple Output (MIMO) is a wireless technology that allows for significant increase in data throughput due to the use of multiple antennas and multiple data streams.
True
The term "Channel bonding" refers to a technique that allows for combining adjacent wireless channels to increase the amount of available bandwidth.
True
Barry is working with his organization's platforms team to select a virtualization approach for use in their data center. To provide stronger security, he would like to select a hypervisor that runs directly on bare metal hardware without an intervening host operating system. What type of hypervisor should he choose?
Type 1
James is working with his organization's platforms team to select a virtualization approach for use on test systems managed by developers. He is looking for a hypervisor that can run on top of the Windows operating system already installed on their laptops. What type of hypervisor is James looking for?
Type 2
Which of the protocols listed below reside at the OSI transport layer? (Select 2 answers)
UDP, TCP
What are two ways to protect a computer from malware?
Use antivirus software Keep software up to date
Two or more computers connected together over a wide geographical area (e.g. county, country, globe). What type of network is this?
WAN
Which of the following wireless security protocols has been discouraged in favor of newer standards due to known vulnerabilities resulting from implementation flaws?
WEP
Which one of the following wireless encryption protocols is considered the weakest and recommended to no longer use?
WEP
Which of the following would provide the most effective security for a small wireless network?
WPA2
A cybersecurity specialist is asked to identify the potential criminals known to attack the organization. Which type of hackers would the cybersecurity specialist be least concerned with?
White hat hackers
In a private cloud companies such as Amazon Web Services, Microsoft Azure, and Google Cloud Platform are responsible for the physical data center security concerns.
false
Transmission Control Protocol (TCP) is an example of a connectionless protocol. Because TCP does not support three-way handshake while establishing a network connection, it is referred to as unreliable or best-effort protocol. Example applications of TCP include transmission of video and audio streaming data.
false
In the OSI model, the layer 2 PDU is called:
frame
Diana is investigating suspicious software installed on a machine and would like to identify any network connections made by that machine. Which one of the following tools can best assist her with this task by running it on the target machine?
netstat
In the OSI model, the layer 3 PDU is known as:
packet
Starting at layer 1 and going to layer 7, what are the layers of the OSI model?
physical, data link, network, transport, session, presentation, application
In the OSI model, the layer 4 TCP PDU is known as:
segment
Which type of fiber cable is normally used to connect two buildings that are several miles apart?
single-mode