1. What statement regarding the different versions of the SHA hashing algorithm is accurate?
a. SHA-0 is the most secure version of SHA.
b. SHA-1 supports a 128-bit hash function.
c. SHA-2 only supports a 256-bit hash.
d. SHA-2 and SHA-3 both support the same hash lengths. - ✔✔SHA-2 and SHA-3 both support the same
hash lengths.
2. A variant of BYOD, what does CYOD allow employees or students to do?
a. They can supply their own software on a computer or mobile device.
b. They can supply their choice of cloud application or storage.
c. They can choose a device from a limited number of options.
d. They can use whatever devices they wish to bring. - ✔✔They can choose a device from a limited
number of options.
3. Utilized by China's so-called "Great Firewall", what type of attack can prevent user access to web
pages, or even redirect them to illegitimate web pages?
a. MAC address spoofing
b. denial-of-service attack
c. DNS poisoning
d. rogue DHCP server - ✔✔denial-of-service attack
4. In the typical social engineering attack cycle, what occurs at Phase 3?
a. The attacker researches the desired target for clues as to vulnerabilities.
b. The attacker builds trust with the target and attempts to gain more information.
, c. The attacker exploits an action undertaken by the victim in order to gain access.
d. The attacker executes an exit strategy in such a way that does not leave evidence or raise suspicion. -
✔✔The attacker exploits an action undertaken by the victim in order to gain access.
5. In a red team-blue team exercise, what is the purpose of the blue team?
a. The blue team is tasked with attacking the network.
b. The blue team must observe the actions of the red team.
c. The blue team is charged with the defense of the network.
d. The blue team consists of regulators that ensure no illegal activity is undertaken. - ✔✔The blue team
is charged with the defense of the network.
6. What document addresses the specific concerns related to special access given to administrators and
certain support staff?
a. non-disclosure agreement
b. acceptable use policy
c. password policy
d. privileged user agreement - ✔✔privileged user agreement
7. VMware's AirWatch and Cisco's Meraki Systems Manager are both examples of what type of software?
a. mobile device management software
b. software defined network software
c. virtual device management software
d. cloud network management software - ✔✔mobile device management software
8. Which command can be used on a Windows system to create a hash of a file?
a. md5
b. shasum
c. Get-FileHash
d. Compute-FileHash - ✔✔Get-FileHash