You are a network security analyst for a large corporation. The company has recently
experienced a series of network attacks, and you've been tasked with hardening the
network switches to prevent future attacks. You've identified several potential measures to
improve security.
Which of the following would be the MOST effective approach to hardening the switches?
Enabling HTTP services for remote management.
Changing the default credentials.
Implementing Access Control Lists (ACLs).
Disabling unnecessary services and interfaces. -
Answer✅
Disabling unnecessary services and interfaces.
Explanation
Disabling unnecessary services and interfaces is the most effective approach. Disabling
unnecessary services and interfaces reduces the attack surface of the switch, making it
harder for attackers to gain access. This is a more comprehensive measure compared to the
other options, making it the most effective approach to switch hardening.
Quiz_________________?
Listen to exam instructions
1
,Which of the following types of site surveys should be performed first?
Active
Passive
Ad hoc
Predictive -
Answer✅
Passive
Explanation
An initial site survey performed should be a passive survey. This survey is performed
without the analyzer connecting to any specific WAP and is in a listen-only mode.
Quiz_________________?
You are concerned that wireless access points may have been deployed within your
organization without authorization.
What should you do? (Select two. Each response is a complete solution.)
Check the MAC addresses of devices connected to your wired switch.
Implement a network access control (NAC) solution.
Implement an intrusion prevention system (IPS).
Conduct a site survey.
Implement an intrusion detection system (IDS). -
Answer✅
Check the MAC addresses of devices connected to your wired switch.
Conduct a site survey.
Quiz_________________?
Which type of wireless access point is generally used in a residential setting?
2
,WLC
LWAP
SOHO
Bridge -
Answer✅
SOHO
Explanation
In a small office or residential location, a Small Office Home Office (SOHO) wireless router
is often used. These devices are three different devices in one:
A router function connects the internal LAN to the internet.
A switch portion connects the internal wired LAN devices.
An access point portion allows the internal wireless devices to connect to the network.
Quiz_________________?
Which of the following is responsible for broadcasting information and data over radio
waves?
Wireless bridge
Wireless LAN controller
Wireless interface
Wireless access point -
Answer✅
Explanation
A wireless access point (WAP) broadcasts information and data over radio waves. WAPs
function as wireless hubs.
Quiz_________________?
3
, A large financial institution recently adopted a bring your own device (BYOD) policy. It
understands the cost and flexibility advantages of this approach but is concerned about the
potential security implications.
Specifically, the institution wants to ensure that its sensitive data remains protected even
when accessed from or stored on employees' personal devices.
What would be the MOST effective strategy to safeguard data in this context?
Regularly update the company's firewall and antivirus software
Deploy a mobile device management (MDM) solution
Implement mandatory password changes every 30 days
Conduct regular security training for employees -
Answer✅
Deploy a mobile device management solution
Explanation
An MDM solution allows a company to manage, secure, and enforce policies on employees'
mobile devices, even if they are personal devices.
Quiz_________________?
The IT team of a medium-sized company plans to implement a mobile device management
(MDM) solution to enhance security and streamline the management of its growing number
of mobile devices.
The company has employees who use various devices, such as smartphones and tablets, for
work tasks in and out of the office.
The IT team needs to choose the MOST appropriate deployment model for their MDM
solution to ensure seamless device management and data protection.
Which deployment model for MDM provides the highest level of control and security for
the company's diverse mobile devices?
Bring your own device (BYOD) deployment with partial control
4