QUESTIONS WITH CORRECT DETAILED
ANSWERS
What kind of vulnerability is exploited by a ping of death?
A. Zero-day exploit
B. Buffer overflow
C. Social engineering
D. Backdoor -- ANSWER--Buffer Overflow
Which type of DoS attack orchestrates an attack using uninfected computers?
A. DDoS (distributed DoS) attack
B. Smurf attack
C. DRDoS (distributed reflector DoS) attack
D. PDoS (permanent DoS) attack -- ANSWER--DRDoS (distributed
reflector DoS) attack
What software might be installed on a device in order to authenticate it to the
network?
A. Operating system
B. Security policy
C. NAC (network access control)
Page 1 of 30
,D. Agent -- ANSWER--Agent
What feature of Windows Server allows for agentless authentication?
A. Active Directory
B. ACL (access control list)
C. IDS (intrusion detection system)
D. Network-based firewall -- ANSWER--Active Directory
What kind of firewall blocks traffic based on application data contained within
the packets?
A. Host-based firewall
B. Content-filtering firewall
C. Packet-filtering firewall
D. Stateless firewall -- ANSWER--Content-filtering firewall
At what layer of the OSI model do proxy servers operate?
A. Layer 3
B. Layer 2
C. Layer 7
D. Layer 4 -- ANSWER--Layer 7
What kind of virus runs in place of the computer's normal system files?
Page 2 of 30
, A. Worms
B. Macro viruses
C. File-infector viruses
D. Boot sector viruses -- ANSWER--Boot sector viruses
What is the software that allows you to define VMs and manage resource
allocation and sharing among them? A. Host
B. Guest
C. Switch
D. Hypervisor -- ANSWER--Hypervisor
What virtual, logically defined device operates at the Data Link layer to pass
frames between nodes?
A. Virtual bridge
B. Virtual firewall
C. Virtual switch
D. Virtual router -- ANSWER--Virtual switch
With which network connection type does the VM obtain IP addressing
information from its host?
A. Bridged mode
B. Managed mode
Page 3 of 30