ASSESSMENT NETWORK AND
SECURITY – FOUNDATIONS EXAM
WITH CORRECT ANSWERS
Which OSI layer would define the scope of a protocol that makes sure
packets of data are received correctly and resends them if they are not?
a. Validation
b. Transmission
c. Transport
d. Connection - CORRECT ANSWERS-Transport
Which type of attack send emails claiming to be your bank and asking you to
verify that your username and password are correct?
Dictionary attack
Phishing
Brute force attack
Man-in-the-middle - CORRECT ANSWERS-Phishing
Which protocol suite performs functions of OSI layer 4?
a. IPX
b. MAC
c. CSMA/CD
d. TCP - CORRECT ANSWERS-TCP
What are two types of encryption?
a. Symmetric encryption, the same key encrypts and decrypts data;
asymmetric encryption different keys encrypt and decrypt data
b. Synchronous encryption, the same key encrypts and decrypts data;
asynchronous encryption different keys encrypt and decrypt data
c. Symmetric encryption, a different key encrypts and decrypts data;
asymmetric encryption, the same key encrypts and decrypts data
,d. Synchronous encryption, a different key encrypts and decrypts data;
asynchronous encryption the same key encrypts and decrypts data -
CORRECT ANSWERS-a. Symmetric encryption, the same key encrypts and
decrypts data; asymmetric encryption different keys encrypt and decrypt
data
Which OSI layer is related to the function of the IP protocol suite?
a. Transport
b. Network
c. Data Link
d. Session - CORRECT ANSWERS-Network
Which OSI layer is responsible for organizing how bits are passed over the
physical layer between devices within the same collision domain?
a. Frame
b. Connection
c. Transport
d. Data Link - CORRECT ANSWERS-Data Link
Who uses Nessus software to san servers and network devices for known
vulnerabilities.
Script Kiddies
Insider threats
Vulnerability testers
Black hat hackers - CORRECT ANSWERS-Vulnerability testers
Which attack allows an attacker to take control of a database by inserting
special commands into input boxes instead the intended data? - CORRECT
ANSWERS-SQL Injection
What type of attack is it when the attacker discovers a software vulnerability
that does not have a patch? - CORRECT ANSWERS-Zero-day
What phrase represents Authentication best?
Do you do what you say you will do?
Are you credentialed for the level of access you need?
Did you arrive at the time you said you did?
Are you who you say you are? - CORRECT ANSWERS-Are you who you say
you are?
ARP Poisoning allows an attacker to:
,Eavesdrop on the traffic sent through the Hub
Eavesdrop on the traffic sent through the Switch
Eavesdrop on the traffic sent through the Router
Eavesdrop on the traffic sent through the Firewall - CORRECT ANSWERS-
Eavesdrop on the traffic sent through the Switch
What does AAA stand for?
Authorization, Access and Accounting
Authentication, Access and Autoscaling
Authentication, Authorization and Accounting
Access, Authorization and Authentication - CORRECT ANSWERS-
Authentication, Authorization and Accounting
What is the best choice that describes the difference between IDS and IPS?
a. IPS can only detect intrusions and IDS can detect and stop malicious
network attacks.
b. IDS can detect intrusions and IDS can stop malicious network attacks.
c. IDS is only used for webservers; IPS can be used in all environments
d. IDS can detect intrusions; IPS can stop malicious network attacks. -
CORRECT ANSWERS-d. IDS can detect intrusions; IPS can stop malicious
network attacks.
Which type of Ethernet cable can maintain 10Gbps transmission speeds
through the course of its maximum 100-meter length?
a. CAT 5e
b. CAT 5
c. CAT 3
d. CAT 6a - CORRECT ANSWERS-CAT 6a
Which Internet access technology uses ordinary telephone wires for data
transmission?
a. DSL
b. Cable
c. Wi-Fi
d. Hotspot - CORRECT ANSWERS-DSL
Which device is used to organize network cables as they run between
switches and other network devices?
a. Jack
b. Hub
, c. Patch Panel
d. Router - CORRECT ANSWERS-Patch Panel
Which network device is used to connect two or more network segments by
performing OSI layer 3 functions like packet-forwarding?
a. Router
b. Repeater
c. Wire
d. Switch - CORRECT ANSWERS-Router
Which network device is used to convert between digital information from a
LAN and analog signals for transmission over a standard telephone wire?
a. Repeater
b. Modem
c. Signal Generator
d. Bit Stretcher - CORRECT ANSWERS-Modem
Which device could be used to send commands to the mainframe for remote
execution in early mainframe installations?
a. Distributed Screens
b. Dumb Terminals
c. Execution Displays
d. Command Receivers - CORRECT ANSWERS-Dumb Terminals
Which device is responsible for implementing network address translation
(NAT)?
a. Modem
b. Router
c. NIC
d. Switch - CORRECT ANSWERS-Router
Which command produces the following output?
Non-authoritative answer:
Name: www.google.com
Address: 172.217.11.132
a. dig
b. nslookup
d. whois
d. nmap - CORRECT ANSWERS-nslookup