REVIEW 2026 QUESTIONS CORRECT
RESPONSES
◉ FCoE (Fibre Channel over Ethernet). Answer: A technology that
encapsulates Fibre Channel frames over Ethernet networks allowing
FC to use 10Gbps (or higher) Ethernet networks
while preserving the
FC protocol; jumbo frame supported
◉ iSCSI (Internet Small Computer Systems Interface). Answer:
technology that enables the SCSI protocol to communicate over IP
networks
◉ NAS (Network Attached Storage). Answer: a file-level storage
device that can be accessed on a network;
available on FTP, NFS, AFP, SMB
◉ Social Engineering. Answer: A process by which an intruder
obtains enough information from people to gain access to the
network
,◉ Password Cracking. Answer: An attack in which the attacker tries
to guess the user's password
◉ Dictionary Attack. Answer: An attack that uses known passwords
and many variations (upper- and lowercase and combinations) to
try to log in to an account
◉ Brute-Force Attack. Answer: An attack in which the attacker uses
every possible combination of characters to guess the password
◉ Packet Sniffing. Answer: A technique in which the contents of data
packets are watched
◉ IPSec (Internet Protocol Security). Answer: layer 3 protocol in
which each packet is encrypted prior to transmission across the
network link
◉ Man-in-the-Middle. Answer: An attack in which an attacker can
seamlessly place itself in the middle of a conversation between
others in order to become the recipient of all information sent by
victim computers
◉ ARP Cache Poisoning. Answer: An attack in which an attacker
changes the MAC addresses of the ARP cache, or "poisons the ARP
,cache" of victims to the MAC address of the attacker so that
conversations get redirected to the attacker
◉ Evil Twin. Answer: A situation in which a rogue wireless access
point poses as a legitimate one by broadcasting a legitimate SSID
and eavesdrops on the wireless network
◉ Session Hijacking. Answer: Exploiting web session control by
stealing a session cookie and using it to establish a session with a
remote server that still thinks the session is valid
◉ Buffer Overflow. Answer: A situation that occurs when a program
tries to put more data into a buffer than it was configured to hold
◉ netstat -a. Answer: The command used to display the ports
currently open on a Windows operating system
◉ netstat -b. Answer: The command used to display the executable
involved in creating the connection or listening port
◉ nmap. Answer: A Linux and Windows port scanner
◉ Penetration Testing. Answer: Evaluating the security of a user's
network by trying to exploit vulnerabilities
, ◉ Virus. Answer: A piece of malicious computer code that, when
opened, can damage hardware, software, or other files
◉ Worm. Answer: A type of virus that attacks computers, typically
proliferates by itself, and can deny service to networks
◉ Malware (Malicious Software). Answer: any program intended to
harm, disrupt, deny, or gain unauthorized access to a computing
system
◉ Zero-Day Attack. Answer: An attack that exploits a software
vulnerability that is unknown to the developer
◉ DoS (Denial of Service). Answer: An attack in which service is
denied to a computer, network, or server
◉ Directed Broadcast. Answer: A broadcast that is sent to a specific
subnet
◉ PDoS (permanent denial of
service). Answer: A malicious attack that aims to sabotage hardware
and render it useless