VERSION 2025 ACTUAL EXAM
COMPLETE QUESTIONS AND CORRECT
ANSWERS|ALREADY GRADED A+
Which security device is typically used to enforce rules between network zones? -
Answers -✔✔ Firewall
Which of the following network security zones is subject to strict hardening and
configuration management policies, and where hosts, user accounts, and traffic are
continually monitored to ensure compliance with security policies? - Answers -✔✔
Private server administrative networks
What is the role of VLANs in network segmentation? - Answers -✔✔ To create separate
broadcast domains
Which of the following servers should be placed in a perimeter network? - Answers -✔✔
Web servers providing public access services
What is the purpose of a choke point in a screened subnet configuration? - Answers -
✔✔ To facilitate better access control and easier monitoring
What is a perimeter network also known as? - Answers -✔✔ A demilitarized zone (DMZ)
What is the role of the screening firewall in a screened subnet? - Answers -✔✔ To
restrict traffic on the external/public interface
Which IDS traffic assessment indicates that the system identified harmless traffic as
offensive and generated an alarm or stopped the traffic? - Answers -✔✔ False positive
You're concerned about attacks directed at your network firewall. You want to be able to
identify and be notified of any attacks. In addition, you want the system to take
immediate action to stop or prevent the attack, if possible.
Which tool should you use? - Answers -✔✔ IPS
Which of the following best describes the role of a sniffer in an Intrusion Detection
System (IDS)? - Answers -✔✔ It reads frames from a mirrored port to monitor network
traffic.
Which of the following is a potential vulnerability of integrated peripherals in smart
devices? - Answers -✔✔ Facilitation of surveillance