EXAM STUDY GUIDE 2026/2027 COMPLETE
QUESTIONS WITH VERIFIED CORRECT
ANSWERS || 100% GUARANTEED PASS
Which type of firewall initiates a new connection on behalf of the client and presents its own IP
to the server when a client initiates a connection to a server?
a. Application level
b. Packet filtering
c. Circuit level
d. Stateful inspection - ANSWER c. Circuit level
Which feature of a firewall allows an organization to use private non-routable networks while
enabling communication to the internet?
a. Port Address Translation (PAT)
b. Border Gateway Protocol (BGP)
c. Static routing
d. Packet filtering - ANSWER a. Port Address Translation (PAT)
What is the meaning of "state" when referring to stateful inspection in firewalls?
,a. It refers to the connection state of a conversation between two computers.
b. It refers to the connection state of a computer to the network.
c. It refers to the two firewall rules needed, one for the sender and one for the recipient.
d. It refers to the inspection of the traffic payload and forwarding on to its destination. -
ANSWER a. It refers to the connection state of a conversation between two computers.
What can a user install to detect malicious software?
a. Proxy
b. Antivirus
c. Firewall
d. Patch - ANSWER b. Antivirus
Which feature of a network intrusion prevention system (NIPS) uses a lists of known bad IP
addresses to protect the network?
a. Reputation-based prevention
b. Anomaly-based protection
c. Behavior-based analysis
d. Cloud-based sandbox environment - ANSWER a. Reputation-based prevention
Which attack tricks a client into mapping an IP address to a spoofed MAC address?
a. ARP spoofing
b. Evil-twin attack
, c. Rogue DHCP server
d. IP starvation - ANSWER a. ARP spoofing
Which type of port has access to all VLANs by default in a traditional layer 2 switch?
a. Uplink
b. Downlink
c. Trunk
d. Console - ANSWER c. Trunk
A company provides access to employees' tax and personal information via a public-facing web
portal. What should the company implement to encrypt employees' web access to this
information?
a. Transport layer security (TLS)
b. Network intrusion detection system (NIDS)
c. Advanced encryption standard (AES)
d. Two-factor authentication (2FA) - ANSWER a. Transport layer security (TLS)
What is end-to-end encryption?
a. Data is encrypted on the sender's system and only the recipient is able to decrypt it.
b. Certificate authorities establish static routes for two systems to communicate.
c. Temporary VPN is established to protect all data communications.
d. Data is encrypted with a private pre-shared key and cannot be decrypted by the sender. -
ANSWER a. Data is encrypted on the sender's system and only the recipient is able to
decrypt it.