ANSWERS 2024/2025 CORRECT/ ALL
BUNDLEDNTO BOOST AND EASE YOUR
STUDY/ 100% GUARANTEED PASS
An authoritative Domain Name System (DNS) server for a zone creates a
Resource Records Set (RRSet) signed with a zone signing key. What is the result
of this action? - ANSWER>>DNS Security Extensions
The administrator of an Exchange Server needs to send digitally signed and
encrypted messages. What should the administrator use? - ANSWER>>S/MIME
An organization uses a Session Initiation Protocol (SIP) endpoint for establishing
communications with remote branch offices. Which of the following protocols
will provide encryption for streaming data during the call? - ANSWER>>SRTP
A web server will utilize a directory protocol to enable users to authenticate
with domain credentials. A certificate will be issued to the server to set up a
secure tunnel. Which protocol is ideal for this situation? - ANSWER>>LDAPS
A Transport Layer Security (TLS) Virtual Private Network (VPN) requires a
remote access server listening on port 443 to encrypt traffic with a client
machine. An IPSec (Internet Protocol Security) VPN can deliver traffic in two
modes. One mode encrypts only the payload of the IP packet. The other mode
encrypts the whole IP packet (header and payload). What are these two modes?
- ANSWER>>Tunnel and Transport
Consider the principles of web server hardening and determine which actions a
system administrator should take when deploying a new web server in a
demilitarized zone (DMZ). - ANSWER>>Establish a guest zone, Manage the
system using SSH, and Use configuration templates
, Which of the following protocols would secure a tunnel for credential exchange
using port 636? - ANSWER>>LDAPS
Implementing Lightweight Directory Access Protocol Secure (LDAPS) on a web
server secures direct queries to which of the following? - ANSWER>>Directory
services
A cyber analyst is drafting a memorandum on the impacts of exposures tied to
successful attacks and route security. What are the vulnerabilities associated
with route security? - ANSWER>>Route injection, Source routing, and Software
exploits
Management has set up a feed or subscription service to inform users on regular
updates to the network and its various systems and services. The feed is only
accessible from the internal network. What else can systems administrators do
to limit the service to internal access? - ANSWER>>Provision SSO access.
A small organization operates several virtual servers in a single host
environment. The physical network utilizes a physical firewall with NIDS for
security. What would be the benefits of installing a Host Intrusion Prevention
System (HIPS) at the end points? - ANSWER>>Prevent Malicious Traffic between
VMs and Protection from zero day attacks
Which of the following provides attestation and is signed by a trusted platform
module (TPM)? - ANSWER>>Measured boot
A support technician reviews a computer's boot integrity capabilities and
discovers that the system supports a measured boot process. Which statement
accurately describes this process? - ANSWER>>Measured boot will record the
presence of unsigned kernel-level code.