EXAM WITH ANSWERS |\ |\
In reference to redundant servers, which of the following
|\ |\ |\ |\ |\ |\ |\ |\ |\
best describes when all systems are active and share the
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\
processing load? - CORRECT ANSWERS ✔✔A. Clustered |\ |\ |\ |\ |\ |\ |\
systems
Which technology requires an eavesdropper to send
|\ |\ |\ |\ |\ |\ |\
packets in order to solicit and capture a response, and
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\
potentially poison receiving hosts and/or infrastructure |\ |\ |\ |\ |\ |\
devices with the intent of receiving packets addressed to
|\ |\ |\ |\ |\ |\ |\ |\ |\
other hosts? - CORRECT ANSWERS ✔✔B. Switch
|\ |\ |\ |\ |\ |\
Which of the following is likely to be included in a strong
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\
password policy? - CORRECT ANSWERS ✔✔C. Prohibiting |\ |\ |\ |\ |\ |\ |\
reuse of previously used passwords
|\ |\ |\ |\
IP, ICMP, and IPSec are protocols used in the "Network"
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\
OSI Layer. - CORRECT ANSWERS ✔✔A. TRUE
|\ |\ |\ |\ |\ |\
The "full mesh" network topology strives to separate
|\ |\ |\ |\ |\ |\ |\ |\
critical devices from non-critical devices. - CORRECT
|\ |\ |\ |\ |\ |\ |\
ANSWERS ✔✔B. FALSE |\ |\
, Which of the following determines the largest frame a
|\ |\ |\ |\ |\ |\ |\ |\ |\
particular technology can handle? - CORRECT ANSWERS
|\ |\ |\ |\ |\ |\ |\
✔✔C. MTU |\
Which of the following detail processes and procedures
|\ |\ |\ |\ |\ |\ |\ |\
for detection, communication, response, and recovery, in
|\ |\ |\ |\ |\ |\ |\
the event of a data breach? - CORRECT ANSWERS ✔✔A.
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\
Incident response policies |\ |\
Which of the following is a characteristic of WPA2 (Wi-Fi
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\
Protected Access Version 2)? - CORRECT ANSWERS ✔✔E.
|\ |\ |\ |\ |\ |\ |\ |\
All of the above
|\ |\ |\
Which Bluetooth attack exploits a user definable field in
|\ |\ |\ |\ |\ |\ |\ |\ |\
the transmission packet? - CORRECT ANSWERS ✔✔A.
|\ |\ |\ |\ |\ |\ |\
Bluejacking
Which OSI Layer transmits logical bits (1's and 0's) over a
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\
physical circuit? - CORRECT ANSWERS ✔✔A. Physical
|\ |\ |\ |\ |\ |\
Which of the following describes Bluebugging? - CORRECT
|\ |\ |\ |\ |\ |\ |\
ANSWERS ✔✔D. Allows an attacker to send commands to
|\ |\ |\ |\ |\ |\ |\ |\ |\
the device
|\ |\