SOLVED QUESTIONS
◉ Which firewall option would allow an administrator to permit an
application into an organization's network?
A. Whitelisting
B. Filtering
C. Port Security
D. Blacklisting. Answer: A
◉ The command "Mac Address Sticky" uses physical addresses to
restrict and provide network access to the device. True or false?.
Answer: T
◉ Which of the following is a threat associated with operating in the
cloud?
A. Unsecure-Wi-Fi
B. Malicious insider
C. Bluejacking
D. Evil Twin. Answer: B
,◉ Which of the following practices are likely to put corporate
systems at risk?
A. CIA
B. Patching
C. MDM
D. BYOD. Answer: D
◉ A unique feature of a hybrid cloud is the combination of a private
and public cloud. True or false?. Answer: T
◉ Which mobile security standard allows an organization to manage
mobile devices?
A. MDM
B. BYOD
C. SSH
D. CAN bus. Answer: A
◉ Which of the following are fundamentals of MFA? (Choose three)
A. Something you have, such a one time pin
B. Something you know, such as a password
C. Something you do, such as a sport
D. Something you are, such as biometrics. Answer: ABD
, ◉ In which of the following can the attacker use ARP Poisoning to
compromise systems?
A. LAN
B. Bluetooth
C. WAN
D. None of the above. Answer: A
◉ Locking is an effective mitigative measure again race condition
attacks. True or false?. Answer: T
◉ You are informed that the recently hired junior accountant within
your organization has had her device compromised after clicking on
a link within an email that was seemingly sent from the head of
accounting department. What type of attack would the junior
accountant been a victim of?
A. Phishing attack
B. SQL Injection
C. DDOS attack
D. MITM attack. Answer: A
◉ Which security concerns are more easily implemented in the
cloud? (Choose three)
A. Data locality