UPDATED ACTUAL Exam Questions and
CORRECT Answers
What are the different types of threats? - CORRECT ANSWER - Information Theft
Data loss and Manipulation
Identity Theft
Disruption of Service
What are the different types of vulnerabilities? - CORRECT ANSWER - Technological,
Configuration and policy.
Describe hardware threats from the Physical threat class. - CORRECT ANSWER - Damage to
routers, servers...etc.
What does it describe when extreme temperature / humidity threatens devices? - CORRECT
ANSWER - Environmental threat.
Describe electrical threats from the Physical threat class. - CORRECT ANSWER - Spikes in
voltage, insufficient voltage, unconditioned power, and total power loss.
What is the final class in the Physical threat class? - CORRECT ANSWER - Maintenance
threats.
What are the types of malware? - CORRECT ANSWER - Viruses, worms and trojan horses.
How do trojan horses spread? - CORRECT ANSWER - They self replicate but spread through
user interaction.
, What distinguishes worms from other types of malware? - CORRECT ANSWER - They do
not need a human / program operating it.
What are the three Network attack categories? - CORRECT ANSWER - Reconnaissance,
Access, and Denial of Service.
What commands can easily determine the IP address space assigned to an entity? - CORRECT
ANSWER - nslookup and whois
What are the two ping sweep tools? - CORRECT ANSWER - fping and gping.
What are the different types of access attacks? - CORRECT ANSWER - Password attacks
Trust Exploitation
Port Redirection
Man in the Middle
What does a DoS attack do? - CORRECT ANSWER - Interrupts communication.
What assets are available to aid the user in preventing threats? - CORRECT ANSWER - VPN
ASA Firewall
IPS
ESA/WSA
AAA Server
How should a user back up their data? - CORRECT ANSWER - Frequently, using proper
storage, secure location, and validation.
True or false. AAA (Authentication, Authorization & Accounting) is similar to a credit card. -
CORRECT ANSWER - True.