ITN 263 QUIZ 1 NETWORKING& CYBER INFRASTRUCTURE EXAM 2026 LATEST UPDATED
QUESTIONS WITH ANSWERS GRADED A+.
Which of the following is described as "confidence in your expectation that others will act in your best
interest"? - (ANSWER)Trust
Estefan is a network professional for an e-commerce company. The chief information officer (CIO) wants
the customer web portal downtime to be reduced from 5 minutes per year to 30 seconds per year. The
change should occur over the next 6 months. Which security objective must Estefan employ to
accomplish this goal? - (ANSWER)Availability
Kristin's position in IT focuses on using antivirus, anti-spyware, and vulnerability software patch
management to maintain security and integrity. Which IT infrastructure domain is she protecting? -
(ANSWER)Workstation Domain
To secure the System/Application Domain of an IT infrastructure, what is the primary focus? -
(ANSWER)In a collection of servers and virtualized systems, defending both data and server computing
power
Which of the following must be done first to accomplish an organization's security goals? -
(ANSWER)Write down security goals.
Temika is the IT security officer for her company. The CIO has told her that network security success is
not about preventing all possible attacks or compromises. Of the following, what goal or
accomplishment should she work toward? - (ANSWER)Continually improving the state of security so
that, as time passes, the network is better protected than it was in the past
Which of the following roles is most commonly responsible for observing system and user activity,
looking for violations, trends toward bottlenecks, and attempts to perform violations? -
(ANSWER)Auditor
A company has discovered that confidential business information has been repeatedly acquired by a
competitor over the past six months. The IT security team has been unable to find the leaks. The team
suspects a form of side-channel eavesdropping may be involved. What is the suspected hacking
method? - (ANSWER)The competitor is using a phreaking attack.
, ITN 263 QUIZ 1 NETWORKING& CYBER INFRASTRUCTURE EXAM 2026 LATEST UPDATED
QUESTIONS WITH ANSWERS GRADED A+.
As part of the bring your own device (BYOD) program, the company CIO is encouraging employees to
use their personal devices for business purposes. However, an attacker with the right kind of antenna
can access the wireless network from a great distance, putting internal assets at risk. Of the following,
what is the best solution? - (ANSWER)Physically isolate wireless access from the wired network.
A combination of intrusion detection and prevention, as well as logging and monitoring, provides the
best defense against what kind of attack? - (ANSWER)Zero-day exploit
Which of the following is considered a node? - (ANSWER)Networked printer
You are setting up a small home network. You want all devices to communicate with each other. You
assign IPv4 addresses between 192.168.0.1 and 192.168.0.6 to the devices. What processes must still be
configured so that these nodes can communicate with the Internet? - (ANSWER)Both network address
translation (NAT) and port address translation (PAT) must be enabled to allow private network
addresses to be translated to a random external port and public IP address.
Many company employees work from home on a full-time basis. What technology do they commonly
use to communicate securely with the organization's network? - (ANSWER)Virtual private network (VPN)
A major U.S. online retailer has discovered that thousands of purchases have been paid for by stolen
credit card numbers. An initial analysis of the location of the buyers reveals IP addresses from within the
United States. Upon further investigation, it is found that the actual origin point of the fraudulent buyer
is a series of IP addresses located in Asia. What technology is the fraudster using? - (ANSWER)Proxy
server
You are a network professional. You want to overcome the security shortcomings of the Domain Name
System (DNS). Of the following, what is one of those shortcomings? - (ANSWER)Use of a plaintext
communication
Mei is working from home and speaking with her department manager on a Voice over IP (VoIP) phone
connection. This technology allows telephone conversations to be routed over the Internet. During a
VoIP conversation, Mei loses a few moments of what the manager has said to her. What is the problem?
- (ANSWER)The OSI model Transport Layer was unable to guarantee reliable packet delivery.
QUESTIONS WITH ANSWERS GRADED A+.
Which of the following is described as "confidence in your expectation that others will act in your best
interest"? - (ANSWER)Trust
Estefan is a network professional for an e-commerce company. The chief information officer (CIO) wants
the customer web portal downtime to be reduced from 5 minutes per year to 30 seconds per year. The
change should occur over the next 6 months. Which security objective must Estefan employ to
accomplish this goal? - (ANSWER)Availability
Kristin's position in IT focuses on using antivirus, anti-spyware, and vulnerability software patch
management to maintain security and integrity. Which IT infrastructure domain is she protecting? -
(ANSWER)Workstation Domain
To secure the System/Application Domain of an IT infrastructure, what is the primary focus? -
(ANSWER)In a collection of servers and virtualized systems, defending both data and server computing
power
Which of the following must be done first to accomplish an organization's security goals? -
(ANSWER)Write down security goals.
Temika is the IT security officer for her company. The CIO has told her that network security success is
not about preventing all possible attacks or compromises. Of the following, what goal or
accomplishment should she work toward? - (ANSWER)Continually improving the state of security so
that, as time passes, the network is better protected than it was in the past
Which of the following roles is most commonly responsible for observing system and user activity,
looking for violations, trends toward bottlenecks, and attempts to perform violations? -
(ANSWER)Auditor
A company has discovered that confidential business information has been repeatedly acquired by a
competitor over the past six months. The IT security team has been unable to find the leaks. The team
suspects a form of side-channel eavesdropping may be involved. What is the suspected hacking
method? - (ANSWER)The competitor is using a phreaking attack.
, ITN 263 QUIZ 1 NETWORKING& CYBER INFRASTRUCTURE EXAM 2026 LATEST UPDATED
QUESTIONS WITH ANSWERS GRADED A+.
As part of the bring your own device (BYOD) program, the company CIO is encouraging employees to
use their personal devices for business purposes. However, an attacker with the right kind of antenna
can access the wireless network from a great distance, putting internal assets at risk. Of the following,
what is the best solution? - (ANSWER)Physically isolate wireless access from the wired network.
A combination of intrusion detection and prevention, as well as logging and monitoring, provides the
best defense against what kind of attack? - (ANSWER)Zero-day exploit
Which of the following is considered a node? - (ANSWER)Networked printer
You are setting up a small home network. You want all devices to communicate with each other. You
assign IPv4 addresses between 192.168.0.1 and 192.168.0.6 to the devices. What processes must still be
configured so that these nodes can communicate with the Internet? - (ANSWER)Both network address
translation (NAT) and port address translation (PAT) must be enabled to allow private network
addresses to be translated to a random external port and public IP address.
Many company employees work from home on a full-time basis. What technology do they commonly
use to communicate securely with the organization's network? - (ANSWER)Virtual private network (VPN)
A major U.S. online retailer has discovered that thousands of purchases have been paid for by stolen
credit card numbers. An initial analysis of the location of the buyers reveals IP addresses from within the
United States. Upon further investigation, it is found that the actual origin point of the fraudulent buyer
is a series of IP addresses located in Asia. What technology is the fraudster using? - (ANSWER)Proxy
server
You are a network professional. You want to overcome the security shortcomings of the Domain Name
System (DNS). Of the following, what is one of those shortcomings? - (ANSWER)Use of a plaintext
communication
Mei is working from home and speaking with her department manager on a Voice over IP (VoIP) phone
connection. This technology allows telephone conversations to be routed over the Internet. During a
VoIP conversation, Mei loses a few moments of what the manager has said to her. What is the problem?
- (ANSWER)The OSI model Transport Layer was unable to guarantee reliable packet delivery.