AND ANSWERS ALL CORRECT
Mohammad is presenting IPv6 cryptographic security features to his networking class. A
student asks him to explain data origin authentication. How does he answer this
question? - Answer- It uses a checksum that incorporates a shared encryption key so
that the receiver can verify that the data was actually sent by the apparent sender.
While there is no single rule as to the size of this network type, which network is usually
made up of fewer than 10 computers and rarely more than 20? - Answer- Workgroup
Vivienne has been commissioned to design a workgroup network infrastructure for a
small office that includes five workstations, three laptops, and a printer. Given that some
of the nodes are stationary and others are mobile, what is the best solution for
interconnectivity? - Answer- Wireless access point (WAP) and wired switch
Miles is an IT consultant. He is given the specifications of a networking project for the
new campus of a multinational corporation. Among the requirements, switches and
wireless access points (WAPs_ must interconnect all nose, the network must use
hardware firewalls, and it must support single sign-on (SSO). Which network
infrastructure does he select that fulfills these requirements? - Answer- Client/server
The chief information officer (CIO) is negotiating lease prices with several
telecommunications providers. She wants a service that offers circuits that will link to
various physical buildings and branches, including a connection to the physical
demarcation point. For what network infrastructure will this service be used? - Answer-
Wide area network (WAN)
Samantha is a network engineer. She is writing a proposal to her company's chief
information officer (CIO) about the deployment of a group of end-user nodes to replace
the office's aging workstations. Her solution is to use PC's with only display screens,
keyboards, and mice, with all of the computing work and storage hosted on servers.
What is her solution? - Answer- Thin client
Eduardo is configuring a system that allows multiple users working from home to
connect to the office network over a wide area network (WAN) link. The platform is
required to accept inbound connections from those user computers, allowing the clients
to interact with the network as if they were locally connected. What is he working on? -
Answer- Remote access server (RAS)
, Which type of boundary network hosts resource servers for the public Internet? -
Answer- Demilitarized zone (DMZ)
Which of the following is described as "confidence in your expectation that others will
act in your best interest"? - Answer- Trust
Estefan is a network professional for an e-commerce company. The chief information
officer (CIO) wants the customer web portal downtime to be reduced from 5 minutes per
year to 30 seconds per year. The change should occur over the next 6 months. Which
security objective must Estefan employ to accomplish this goal? - Answer- Availability
Kristin's position in IT focuses on using antivirus, anti-spyware, and vulnerability
software patch management to maintain security and integrity. Which IT infrastructure
domain is she protecting? - Answer- Workstation Domain
To secure the System/Application Domain of an IT infrastructure, what is the primary
focus? - Answer- In a collection of servers and virtualized systems, defending both data
and server computing power
Which of the following must be done first to accomplish an organization's security
goals? - Answer- Write down security goals.
Temika is the IT security officer for her company. The CIO has told her that network
security success is not about preventing all possible attacks or compromises. Of the
following, what goal or accomplishment should she work toward? - Answer- Continually
improving the state of security so that, as time passes, the network is better protected
than it was in the past
Which of the following roles is most commonly responsible for observing system and
user activity, looking for violations, trends towards bottlenecks, and attempts to perform
violations? - Answer- Auditor
A company has discovered that confidential business information has been repeatedly
acquired by a competitor over the past six months. The IT security team has been
unable to find the leaks. The team suspects a form of side-channel eavesdropping may
be involved. What is the suspected hacking method? - Answer- The competitor is using
a phreaking attack
As part of the bring your own device (BYOD) program, the company CIO is encouraging
employees to use their personal devices for business purposes. However, an attacker
with the right kind of antenna can access the wireless network from a great distance,
putting internal assets at risk. Of the following, what is the best solution? - Answer-
Physically isolate wireless access from the wired network.
A combination of intrusion detection and prevention, as well as logging and monitoring,
provides the best defense against what kind of attack? - Answer- Zero-day exploit