f f f f f f
5 Objective Assessment Verified Questionsand Answ
f f f f f f
ers 100% Graded A+
f f f
InfwhichfphysicalfLANftopologyfarefnodesfconnectedftofeachfotherfwithfafbackbonefcabl
efthatfloopsfaroundfandfendsfatfthefsamefpointfitfstarted?
a.fRingf
b.fBusf
c.fStar
d.fTreef-fRing
WhichfOSIflayerfensuresferror-freefpackets?
a.fApplicationf
b.fTransportfc
.fSession
d.fPresentationf-fTransport
Whichftopologyfusesfafswitchforfhubftofconnectftofallfdevicesfinfthefsamefnetwork?
a.fMeshf
b.fRingfc
.fStar
d.fBusf-fStar
Whichfcloudfservicefprovidesfhardware,foperatingfsystems,fandfwebfserversfbutfnotfend
-userfapplications?
a.fIaaSf
b.fPaaSf
c.fSaaS
d.fRaaSf-fPaaS
Whichfcloudfmodelfprovidesfanfexclusivefcloudfcomputingfservicefenvironmentfthatfisfsharedf
betweenftwoforfmoreforganizations?
a.fPublicf
b.fPrivate
c.fCommunity
d.fHybridf-fCommunity
,Whichftypefoffsoftwarefisfusedftofprovidefvirtualization?
a.fDatabasefb
.fHypervisorfc.
fAntivirus
d.fSpreadsheetf-fHypervisor
Afuserfthatfdoesfnotfwantftofbefidentifiedfwhilefcommunicatingfonfafnetworkfusesfanfapplicatio
nftofalterfthefcomputer'sfidentity.fWhichftypefoffexploitfisfbeingfperpetrated?
a.fDenial-of-
servicefb.f ARPf pois
oningfc.fSmurffattac
k
d.fSpoofingf-fSpoofing
Anfattackerfattemptsftofmisdirectftrafficfonfafnetworkfbackftofthefattackerfbyfcorruptingfthefne
tworkfcomputer'sfcachefoffIPfaddressftofMACfaddressfmappingsfthatfarefcached.fWhichfexpl
oitfisfthefattackerfperpetrating?
a.fPortfscanningf
b.fWiretapping
c.fDenial-of-service
d.fARPfpoisoningf-fARPfpoisoning
Whichfexploitfactuallyfbreachesfthefphysicalfmediumforfusesfdevicesftofmonitorfsignalsffromf
outsidefthefphysicalfmediumfitself?
a. Spoofing
b. Wiretappingf
c.fSniffing
d.fPortfscanningf-fWiretapping
Whichftypefoffattackfcanfoverwhelmfafwebfserverfbyfinsertingfmorefdatafintofafwebfformft
hanfthefsystemfwasfconfiguredftofhold?
a.fBufferfoverflowf
b.fARPfpoisoning
c.fSessionfhijacking
d.fCross-sitefscriptingf-fBufferfoverflow
Whichftypefoffattackfsendsfanfemailfclaimingftofbeffromfafreputablefbusinessfinforderftofentic
efthefrecipientftofprovidefsensitivefinformation?
a.fDenial-of-
servicefb.fPhishing
c.fPasswordfattacks
,d.fMan-in-the-middlef-fPhishing
Afuserfonfafnetworkfisfplanningftoflaunchfanfexploitfagainstfafcoworkerfinfafneighboringfdepar
tment.fThefuserfneedsftofidentifyfthefIPfaddressfoffafcoworkerfinfthefdesiredfdepartment.fWhi
chftoolforfutilityfwillfallowfthefuserftofwatchfnetworkftrafficfinfrealftimeftofidentifyfaftarget?
a. Portfscan
b. Antivirusfsoftwaref
c.fSniffer
d.fPortfredirectionf-fSniffer
Whichfgroupfoffattackersfisftypicallyfusedfforfpenetrationftesting?
a.fRedfTeamfb.
fBluefTeamf c.f
WhitefTeam
d.fGrayfTeamf-fRedfTeam
Whichftypefoffattackfexploitsfanfunpatchedfsoftwarefvulnerability?
a.fZero-
dayfb.fBrue-
force
c.fDiffie-Hellman
d.fMan-in-the-middlef-fZero-day
AfcompanyfhasfthefpolicyfthatfallfnewfuserfpasswordsfarefP@ssw0rdfbutfdoesfnotfrequirefn
ewfusersftofchangeftheirfpassword.fAnfemployeefrandomlyftriesfafcoworker'sfaccountfwithft
hefnewfuserfpasswordftofseefifftheyfcanflogfinfasfthefcoworker.fWhichftypefoffvulnerabilityfdo
esfthisfcreate?
a. BYOD
b. Weakfpasswordfc
.fDefaultfpassword
d.fMisconfiguredffirewallfrulesf-fDefaultfpassword
Anfemployeefthatfdoesfnotfwantftofmissfemailsffromfimportantfclientsfsetsfupfherfcellul
arfsmartphoneftofallowfherftofcheckfemail.fUnfortunately,fshefdoesfnotfinstallfantivirusf
softwarefonfthefcellularfphone.fWhatftypefoffvulnerabilityfisfrepresented?
a. Industryfthreat
b. Misconfiguredffirewallfrulesf
c.fWeakfpasswords
d.fBYOD/Mobilef-fBYOD/Mobile
Whatfisfthefdefinitionfoffvulnerability,finfcomputerfsecurity?
, a. Itfisfafweaknessfwhichfcanfbefexploitedfbyfafthreat,fsuchfasfanfattacker,ftofperformfunaut
horizedfactionsfwithinfafcomputerfsystem.
b. Itfisfafpossiblefdangerfthatfmightfexploitfafweaknessftofbreachfsecurityfandfthereforefcaus
efpossiblefharm.
c. Itfisfanfactionftakenfbyfafthreatfthatfexploitsfafweaknessfthatfattemptsftofeitherfblockfautho
rizedfaccessftofanfassetforftofgainfunauthorizedfaccessftofanfasset.
d. Itfisfthefpotentialfoffafthreatftofexploitfafweaknessfviafanfattack.f-
fItf isfaf weaknessf whichfcanfbefexploitedfbyfafthreat,fsuchfasfanfattacker,ftofperformfunauthori
zedfactionsfwithinfafcomputerfsystem.
Whatfisfrequiredftofestablishfafsecurefconnectionftofafremotefnetworkfoverfanfinsecureflink?
a.fVirtualfPrivatefNetworkf(VPN)fservicefb.
fLinux
c.fCommandfLinefInterface
d.fTORfNetworkf-fVirtualfPrivatefNetworkf(VPN)fservice
Anforganizationfisfconcernedfaboutfbrutefforcefattacks.fHowfs
houldftheforganizationfcounterfthisfrisk?
a. Installfafmantrapfandfbiometricfscannerfatfthefentrancefoffitsfdatafcenter.
b. Implementfafsystemfhardeningfpolicyfthatfensuresfoperatingfsystemfupdatesfandfsoft
warefpatchesfarefinstalledfregularly.
c. Institutefaflog-
infpolicyfthatflocksfusersfoutfoffanfaccountfafterfthreeffailedfpasswordfattempts.
d. Initiatefrole-
basedfaccessftofitsfsystemsftofreducefthefpossibilityfoffescalatedfprivileges.f-
f c.f Institutefaf log-
infpolicyfthatflocksfusersfoutfoffanfaccountfafterfthreeffailedfpasswordfattempts.
Anforganizationfsuffersfafsocialfengineeringfattackfthatfresultsfinfafcybercriminalfgainingf
accessftofitsfnetworksfandftofitsfcustomers'fprivatefinformation.
Howfcanftheforganizationfmitigatefthisfriskfinftheffuture?
a.fUpdatefuserfantivirusfsoftwareftoftheflatestfversionfb.fI
mplementfafstrongerfpasswordfpolicy
c.fProvidefregularfcybersecurityftrainingfforfemployees
d.fInstallfafsophisticatedfintrusionfdetectionfsystemf-
f c.f Providef regularfcybersecurityftrainingfforf employees
WhichfOSIflayerfisfrelatedftoftheffunctionfoffthefIPfprotocolfsuite?
a.fTransportf
b.fNetwork