SECURITY FOUNDATION EXAM
WITH CORRECT ANSWERS
AAA -Accounting - CORRECT ANSWERS-Accounting or Auditing is a constant
check to make sure that the restrictions in place are working as expected
and no attempt of breaching is made
Which OSI layer is related to the IP protocol - CORRECT ANSWERS-Network 3
Which OSI layer is organizing the bits over the physical layer between
devices in the same collision domain? - CORRECT ANSWERS-Data Link 2 -
They are in the same Frame
Which OSI layer is a Switch at? - CORRECT ANSWERS-Data Link 2
Which OSI layer is a WAP (Wireless Access Point) at? - CORRECT ANSWERS-
Data Link 2
What is AES 256 - CORRECT ANSWERS-Advanced Encryption Standard with a
symmetric key used in most enterprise applications (i.e. banking). Fastest
encryption method
What is SSL - CORRECT ANSWERS-Secure Sockets Layer encryption with an
asymmetric key. Formerly used in https, but now replaced by TSL
What is TSL - CORRECT ANSWERS-Transport layer security, an asymmetric
key that replaced SSL. used in https
What is IPsec - CORRECT ANSWERS-Internet Protocol Security used to
encrypt data in flight with an asymmetric key commonly used in VPN's
Where are public keys used - CORRECT ANSWERS-Asymmetric encryption
uses public and private keys
Private Cloud - CORRECT ANSWERS-Single Tenant use. Often in one data
center and the owner holds the responsibility
, Public Cloud - CORRECT ANSWERS-AWS or MS Azure that offer multiple
solutions. Data owner often does not know where the data is stored
(building, rack, disk)
Hybrid Cloud - CORRECT ANSWERS-Mix of different clouds
Community cloud - CORRECT ANSWERS-A cloud that is open only to specific
organizations that have common concerns.
What is the highest WLAN security protocol commonly used - CORRECT
ANSWERS-WAP2 encrypted with AES (WAP3 was released in 2018 but not yet
widely adapted).
What is the risk on unsecured public WLAN - CORRECT ANSWERS-Fake
Access. An attacker wants you to connect to their WLAN to gain access to the
sent and received data. Always use a VPN on unsecured networks
What are the 3 AAA stand for - CORRECT ANSWERS-Authentication,
Authorization and Accounting
AAA - Authentication - CORRECT ANSWERS-Process of confirming a users
identity. i.e. Active Directory, MFA
AAA - Authorization - CORRECT ANSWERS-Once the Authentication process is
completed, the Authorization determines what resources the user can access
Which OSI layer is a router at - CORRECT ANSWERS-Network (3)
TCP protocol is on what OSI layer - CORRECT ANSWERS-Transport (4)
OSI layer 1 - CORRECT ANSWERS-Physical Layer (Cable, Hubs, Repeaters)
OSI layer 2 - CORRECT ANSWERS-Data Link Layer (Frame, Switch, PPP,
Ethernet)
OSI layer 3 - CORRECT ANSWERS-Network Layer (Moves packets, IP)
OSI layer 4 - CORRECT ANSWERS-Transport Layer (TCP, end to end
connection)
OSI Layer 5 - CORRECT ANSWERS-Session Layer (API, Sockets, Synch and
send to port)
OSI layer 6 - CORRECT ANSWERS-Presentation layer (Syntax and encryption
layer, SSL, SSH, JPEG)