Complete Questions and Guide Answers
100% Verified Graded A+
1. Which of the following is true regarding a TCP/IP packet being generated as it travels
down the stack?
a) Each layer removes the previous header and adds its own.
b) The packet directly connects to the peer layer on the target device.
c) Each layer removes a header.
d) Each layer adds a header.
Answer: d) Each layer adds a header.
2. Which of the following IEEE 802.11 amendments was created to deliver the feature
set required to handle the upcoming strain that will be put on WLAN?
a) 802.11ax
b) 802.11bg
c) 802.11n
,d) 802.11ac
Answer: a) 802.11ax
- book 1, page 181
3. Threat enumeration is a part of the overall concept known as threat intelli- gence,
which helps to understand the TTP of adversaries. Which of the TTPs is a high-level
description?
a) Tactics
b) Procedures
c) Tools
d) Techniques
Answer: a) Tactics
- book 1, page 29
4. Which of the following IEEE 802.11 amendments currently operates in the 5 GHz
frequency range and allows for a minimum of 1 Gbps bandwidth in a multi-link
scenario?
a) 802.11n
b) 802.11bg
,c) 802.11ax
d) 802.11ac
Answer: d) 802.11ac
- book 1, page 179
5. Which part of IEEE 802 specifically defines the set of protocols for implement- ing
wireless local area networks?
a) IEEE 802.1
b) IEEE 802.3
c) IEEE 802.11
d) IEEE 802.1x
Answer: c) IEEE 802.11
- book 1, page 171
6. Which of the following TCP packet flags indicates that a connection is being shut
down in a graceful fashion?
a) URG
b) FIN
, c) ACK
d) RST
Answer: b) FIN
- book 1, page 89
7. In what type of isolation violation does a malicious actor leverage a compro- mised
VM to execute code on the host computer?
a) VM escape
b) VM resource overloading
c) VM hyperjacking
d) VM sprawl
Answer: a) VM escape
- book 1, page 119
8. Which of the following describes the responsibility for security in a cloud
environment?
a) No responsibility for security
b) Full responsibility of cloud provider