certification Practice Exam Newest 2025/26
100% PASS
A UTM is deployed on the external edge of the main corporate office. The office connects to the
II! II! II! II! II! II! II! II! II! II! II! II! II! II! II! II! II!
WAN port of the edge router. The edge router at the main office connects to the remote offices
II! II! II! II! II! II! II! II! II! II! II! II! II! II! II! II! II! II!
using GRE IPSec tunnels. A network administrator notices that a worm that was not detected by
II! II! II! II! II! II! II! II! II! II! II! II! II! II! II! II!
the UTM has spread from the remote sites into the corporate network. The UTM currently has
II! II! II! II! II! II! II! II! II! II! II! II! II! II! II! II!
traffic rules applied that should block the port used by the worm. Which of the following steps
II! II! II! II! II! II! II! II! II! II! II! II! II! II! II! II! II!
would MOST likely correct this issue?
II! II! II! II! II! II!
A. Move the UTM onto the LAN side of the network
II! II! II! II! II! II! II! II! II! II!
B. Enable TLS inspection on the UTM
II! II! II! II! II! II!
C. Enable stateful inspection on the UTM
II! II! II! II! II! II!
D. Configure the UTM to deny encrypted files from being transferred - Correct Answers C.
II! II! II! II! II! II! II! II! II! II! II! II! II! II! II! II! II! II! II!
Enable stateful inspection on the UTM
II! II! II! II! II! II!
II! A technician recently ran a new cable over fluorescent lighting. Assuming the technician used the
II! II! II! II! II! II! II! II! II! II! II! II! II! II!
II! appropriate cables, which of the following connectors should be used to terminate it?II! II! II! II! II! II! II! II! II! II! II! II!
A. RJ11 II!
B. LC II!
C. BNC II!
D. F-type - Correct Answers B. LC
II! II! II! II! II! II! II! II! II! II! II!
II! A Chief Information Officer (CIO) wants a third party to verify the security surrounding an
II! II! II! II! II! II! II! II! II! II! II! II! II! II!
II! enterprise SQL database server. Which of the following services should the CIO implement?
II! II! II! II! II! II! II! II! II! II! II! II!
, A. PCI compliance
II! II!
B. Database health check
II! II! II!
C. Penetration test
II! II!
D. Network baseline - Correct Answers C. Penetration test
II! II! II! II! II! II! II! II! II! II! II! II! II!
II! An end user at an Internet cafe tries to visit an online retailer's website; however, the website for
II! II! II! II! II! II! II! II! II! II! II! II! II! II! II! II! II!
II! a competitor loads. The user checks the URL in the address bar and verifies it is correct, but the
II! II! II! II! II! II! II! II! II! II! II! II! II! II! II! II! II! II!
II! competitor's page still loads. Which of the following BEST describes what is occurring? II! II! II! II! II! II! II! II! II! II! II! II!
A. Cross-site scripting
II! II!
B. Session hijacking
II! II!
C. Man in the middle
II! II! II! II!
D. DNS poisoning - Correct Answers D. DNS poisoning
II! II! II! II! II! II! II! II! II! II! II! II! II!
II! A technician is troubleshooting a host that is having intermittent issues connecting to internal
II! II! II! II! II! II! II! II! II! II! II! II! II!
II! network resources and the company servers. Using a packet sniffer, the technician notices there
II! II! II! II! II! II! II! II! II! II! II! II! II!
II! are several TCP communications that are missing packets in sequence and need to be
II! II! II! II! II! II! II! II! II! II! II! II! II!
II! retransmitted. The technician receives several SYN-ACK packets with incorrect addressing. Which II! II! II! II! II! II! II! II! II! II!
II! of the following is the MOST likely cause of these issues?
II! II! II! II! II! II! II! II! II! II!
A. DNS poisoning attack
II! II! II!
B. Evil twin on the company network
II! II! II! II! II! II!
C. ARP poisoning attack
II! II! II!
D. Misconfigured VLAN on the local switch - Correct Answers C. ARP poisoning attack
II! II! II! II! II! II! II! II! II! II! II! II! II! II! II! II! II! II!
II! A technician is troubleshooting a network switch that seems to stop responding to requests
II! II! II! II! II! II! II! II! II! II! II! II! II!
II! intermittently whenever the logging level is set for debugging. Which of the following metrics II! II! II! II! II! II! II! II! II! II! II! II! II!
II! should the technician check to begin troubleshooting the issue?
II! II! II! II! II! II! II! II!