FOUNDATIONS EXAM WITH QUESTIONS AND
VERIFIED ANSWERS|| ALREADY GRADED A+||
GUARANTEED PASS|| LATEST UPDATE 2025
What should a cloud provider use to secure data in flight?
a. Private key encryption
b. Demilitarized zone
c. Multifactor authentication
d. Updated antivirus software - ANSWER-a. Private key encryption
An administrator fails to configure protection for usernames and passwords
transmitted across the network. Which component of the AAA model is
weakened?
a. Authentication
b. Authorization
c. Access
d. Availability - ANSWER-a. Authentication
A user is mistakenly granted access to customer accounts not required for his
duties. Which component of the AAA model is violated?
,a. Authentication
b. Authorization
c. Availability
d. Access - ANSWER-b. Authorization
Which network device is usually placed in-line between a trusted network and
an untrusted network?
a. Switch
b. Hub
c. Firewall
d. Repeater - ANSWER-c. Firewall
Which type of firewall technology reads and analyzes the actual content of a
message before forwarding to its destination?
a. Proxy servers
b. Stateful
c. Stateless
d. Router - ANSWER-a. Proxy servers
An organization's IT department is concerned that malicious insiders may be
using elevated access rights.
Which security control can be used to draw attacks away from critical systems?
a. Firewalls
b. Honeypots
c. IDS
,d. IPS - ANSWER-b. Honeypots
If it detects a threat, an IPS can:
a. Record the details of the threat
b. Report the threat to security admins
c. Take preventative action to stop the threat
d. All of the above - ANSWER-d. All of the above
Kyle is concerned that an attacker is probing his network and would like to use
a decoy system to attract the attacker and analyze his or her activity. What type
of tool would best meet Kyle's needs?
a. Honeypot
b. Sinkhole
c. Jump box
d. Darknet - ANSWER-a. Honeypot
Which of the following topologies connects each device to a neighboring
device?*
a. Mesh
b. Bus
c. Ring
d. Star - ANSWER-c. Ring
Which of the following topologies connects all devices to a single cable?*
, a. Bus
b. Star
c. Mesh
d. Ring - ANSWER-a. Bus
With regards to AAA, _______ confirms that the user is how he or she claims to
be.*
a. Authorization
b. Accounting
c. Authentication
d. Accessibility - ANSWER-c. Authentication
Which two layers of the OSI model are the same as the first layer of the TCP/IP
model?*
a. Data Link
b. Session
c. Presentation
d. Physical - ANSWER-d. Physical, a. Data Link
Your company purchases a new bridge that filters packets based on the MAC
address of the destination computer. On which layer of the OSI model is this
device functioning?*
a. Data Link
b. Presentation
c. Session
d. Application - ANSWER-a. Data Link