Comprehensive Resource To Help You Ace 2026-2027
Includes Frequently Tested Questions With
ELABORATED 100% Correct COMPLETE SOLUTIONS
Guaranteed Pass First Attempt!!
Current Update!!
1. How can multiple distinct physical network topologies be combined into a
single network structure?
a) Deploy a star topology.
b) Deploy a ring topology.
c) Deploy a tree topology.
d) Deploy a bus topology. - ANSWER C
2. What is the term used to refer to an activity, occurrence, or event which could
cause damage or harm to an organization?
a) Incident
b) Alarm
c) Baseline
d) Clipping level - ANSWER A
3. How can files be easily exchanged between systems whether local or remote,
when various operating systems are involved, and when all systems support
the TCP/IP protocol stack?
a) SMB
b) NFS
c) FTP
, d) Telnet - ANSWER C
4. How does a Trojan horse get past security mechanisms to harm a victim?
a) By attaching itself to an existing file
b) By displaying advertisements for intriguing applications
c) By seeming to be a benign item
d) By using system resources to distribute itself to other networked devices -
ANSWER C
5. Which term refers to the virtualization of networking which grants more
control and flexibility over networking than using the traditional hardware-
only means of network management?
a) iSCSI
b) Software-defined network
c) Bridging
d) Hypervisor - ANSWER B
6. What is the most appropriate use of IPSec?
a) Processing encryption
b) Storage encryption
c) Data transmission protection
d) Database protection - ANSWER C
7. Why are initialization vectors used as common components of encryption
algorithms?
a) They determine the range of values into which a block can resolve.
b) They increase the chaos in encrypted output.
, c) They set the speed of the encryption process.
d) They start the encryption process at a common point. - ANSWER B
8. What is the term used to describe an entry in a database describing a violation
or exploit which is used to match real-time events in order to detect and
record attacks by the continuous monitoring solution?
a) Countermeasure
b) Threat
c) Signature
d) Vulnerability - ANSWER C
9. Your organization experienced an impersonation attack recently that
compromised the network administrator's user account. In response, new
security measures are being implemented throughout the organization. You
have been assigned the task of improving authentication. You want a new
authentication system that ensures the following:
-Eavesdropped passwords cannot be used by an attacker.
-Passwords are only able to be used once.
-Password predication must be prevented.
-Passwords are only valid for a short period of time.
10.How can you accomplish these goals?
a) Implement a rotating, 30-character password authentication system.
b) Implement a PIN-based authentication system where each PIN is
incremented by three each time a user logs in.
c) Implement an authentication system using wallet cards with a table of
password options.
, d) Implement a synchronized, one-time password token-based authentication
system. - ANSWER D
11.What is the activity called where hackers travel around an area in search for
wireless network signals?
a) War driving
b) War dialing
c) Banner grabbing
d) Foot printing - ANSWER A
12. WAN optimization is the collection of technologies used to maximize
efficiency of network communications across long distance links. WAN
optimization can include data deduplication, compression, and what other
technology?
a) Account lockout
b) Periodic mid-stream re-authentication
c) Encryption
d) Traffic shaping - ANSWER D
13. Which type of secure implementation of client devices has brought back a
concept from the mainframe era where systems on a worker's desk have
minimal storage and computational capacity?
a) Thin clients
b) Mobile devices
c) All-in-one PCs
d) Distributed architecture - ANSWER A