version Comprehensive 215 questions and
verified answers accurate solutions Already
graded A+ Get it 100% correct
3-Way Handshake (TCP) - CORRECT ANSWER: A: SYN
B: SYN ACK
A: ACK
802.11a supports up to - CORRECT ANSWER: 54 Mbps at 5 GHz
802.11ac supports up to - CORRECT ANSWER: 1300 Mbps at 5 GHz
802.11b supports up to - CORRECT ANSWER: 11 Mbps at 2.4 GHz
802.11g supports up to - CORRECT ANSWER: 22/54 Mbps at 2.4 GHz
802.11i - CORRECT ANSWER: Authentication at Layer 2, provides strong encryption,
replay protection and integrity protection - WPA2
802.11n supports up to - CORRECT ANSWER: 54-600 Mbps at 5 GHz
802.1x - CORRECT ANSWER: Network Access Control that is a layer 2 authentication
(Credentialed Question of 2FA)
A security appliance should be set in place when - CORRECT ANSWER: There is a
change in trust level in the network
,Accountability - CORRECT ANSWER: Deals with knowing who did what and when
Active Directory - CORRECT ANSWER: A shared registry for all users and computers
on the network
Address that broadcasts to current network - CORRECT ANSWER: 255.255.255.255
Advanced Encryption Standard (AES) - CORRECT ANSWER: A new encryption
algorithm that is being designed to be effective into the 21st century (Rijndael).
Approved on 12/26/2001 to replace Triple DES
AGULP - CORRECT ANSWER: How privileges and permissions should be applied
▼Accounts
▼Global Groups
▼Universal Groups
Local Groups
▲Permissions & Rights
Analytic Cryptanalysis - CORRECT ANSWER: Uses algorithms and mathematics to
deduce key or reduce key space to be searched
Annualized Loss Expectancy (ALE) - CORRECT ANSWER: Annual expected loss
based on threat.
SLE * Annualized Rate Occurrence = ALE
Application Layer 7 OSI Stack - CORRECT ANSWER: Browsers, FTP, HTTP, SCP
Approaches to Defense-in-Depth - CORRECT ANSWER: Uniform Protection
, Protected Enclaves
Information Centric
Threat Vector Analysis
ARP (Address Resolution Protocol) - CORRECT ANSWER: Required to go from Layer
2 to 3, broadcasts to a network querying for an IP Address, once found, sends it back to
requesting MAC
Asymmetric Encryption (Authentication) - CORRECT ANSWER: Public key, dual-key
encryption. Whatever key encrypts, only the other key decrypts
Authentication - CORRECT ANSWER: A process by which you prove you are who you
say you are. Something you know, have, are.
Authentication Headers (AH) - CORRECT ANSWER: No modification of data in-transit,
no confidentiality, identifies origin
Authentication in Encryption - CORRECT ANSWER: Asymmetric Encryption
Authorization - CORRECT ANSWER: Determines what someone has access to or is
allowed to do after authentication
Baseband Systems - CORRECT ANSWER: Transmits one signal on the medium (fiber,
copper, etc)
Baseline - CORRECT ANSWER: A more specific implementation of a standard
Best to Worst for Enforcing Security Policy - CORRECT ANSWER: Kerberos
NTLM v2