CERTIFICATION SCRIPT 2026 QUESTIONS
WITH SOLUTIONS GRADED A+
◍ Which network vulnerability can be reduced by adding biometric
authentication devices?.
Answer: Weak passwords
◍ What is the meaning of "state" when referring to stateful inspection in
rewalls?.
Answer: It refers to the connection state of a conversation between two
computers.
◍ An adminstrator fails to configure protection for usernames and passwords
transmitted across thenetwork.Which component of the
AAA(Authentication, Authorization and Accounting) model is weakened?.
Answer: Authentication
◍ What should a cloud provider use to secure data in flight?.
Answer: Private key encryption
◍ Which service offering provides the tools and environment for application
development and testing?.
Answer: PaaS
◍ Which device is used to organize network cables as they run between
switches and other network devices?.
Answer: Patch panel
◍ Which type of attack can overwhelm a web server by inserting more data
into a web form than the systemwas con gured to hold?.
Answer: Buffer overflow
, ◍ Which type of attack exploits an unpatched software vulnerability?.
Answer: Zero-day
◍ An attacker attempts to misdirect traf c on a network back to the attacker by
corrupting the networkcomputer's cache of IP address to MAC address
mappings that are cached.Which exploit is the attacker perpetrating?.
Answer: ARP(Address Resolution Protocol) poisoning
◍ Which protocol suite performs functions of OSI(Open Systems
Interconnection model) layer 4?.
Answer: TCP(Transmission Control Protocol)
◍ Which device is responsible for implementing network address translation
(NAT)?.
Answer: Router
◍ Which network topology is shown in the following diagram?.
Answer: Full mesh
◍ Which firewall feature can be used to authenticate users on behalf of another
secure system?.
Answer: Proxy server
◍ A user on a network is planning to launch an exploit against a coworker in a
neighboring department. Theuser needs to identify the IP address of a
coworker in the desired department.Which tool or utility will allow the user
to watch network traf c in real time to identify a target?.
Answer: Sniffer
◍ Which protocol is affected when a malicious user is targeting weaknesses in
Hypertext Transfer Protocol Secure (HTTPS)?.
Answer: Secure Sockets Layer (SSL)
◍ A user receives an email from an unknown bank saying that the user's
account with the bank has been compromised. The user suspects that this is
a phishing exploit. How should the user safely proceed?.
Answer: Open a new browser page, navigate to the bank's website, and