EXAM||FREQUENTLY TESTED
QUESTIONS WITH CORRECT
VERIFIED SOLUTIONS||A+
GRADED!!!<<UPDATED 2025-
2026>>
1. Which protocol is typically used for remote configuration of network
appliances? - ANSWER ✓ SSH
2. What is the purpose of the scp command in SSH? - ANSWER ✓ To
securely copy files between hosts
3. What is the purpose of the ssh-agent command? - ANSWER ✓ To
store private keys securely
4. What is an SSH host key used for? - ANSWER ✓ Identifying the SSH
server
5. Why is Telnet considered to be insecure? - ANSWER ✓ It transmits
data in plain text.
6. What does Network Level Authentication (NLA) protect the RDP
server against? - ANSWER ✓ Denial of service attacks
7. What is RDP Restricted Admin (RDPRA) Mode primarily used for? -
ANSWER ✓ Mitigating the risk of credential compromise
8. You are in the middle of a big project at work. All of your work files
are on a server at the office. You want to be able to access the server
, desktop, open and edit files, save the files on the server, and print
files to a printer that's connected to a computer at home.
9. Which protocol should you use? - ANSWER ✓ RDP
10. What does the AUX port connect to for remote access? -
ANSWER ✓ An analog modem
11. Why is out-of-band management considered more secure than
in-band management? - ANSWER ✓ It is managed over a separate,
dedicated channel.
12. What is a limitation of using virtual out-of-band management
with VLANs? - ANSWER ✓ It may still be compromised by a system-
wide network failure.
13. What is the role of an ACL in the context of a jump box? -
ANSWER ✓ To list permissions for resource access
14. What is the role of an API in the context of a jump box and
automation? - ANSWER ✓ To serve as an interface for automated
scripting
15. What is the benefit of using automation and orchestration in the
context of a jump box? - ANSWER ✓ To configure appliances via
scripts efficiently
16. How can a developer add a firewall rule via an API? - ANSWER
✓ By creating a JSON formatted request and posting it to the API
endpoint
17. In which mode is IPSec used to secure communications
between hosts on a private network? - ANSWER ✓ Transport mode
18. Your company has a policy of using out-of-band management
for critical network devices to ensure that management access is
maintained even if the main network goes down. You are evaluating
the current network setup to ensure compliance with this policy.