Answers 100% Pass
1) Any device with an IP address is a ________.
A) server
B) host
C) client
D) None of the above - ✔✔B
Diff: 1
Question: 1a
2) Any device with an IP address is a host. - ✔✔TRUE
Diff: 1
Question: 1a
3) When you use your mobile firm to surf the Internet, it is a host. - ✔✔TRUE
Diff: 1
Brittie Donald, All Rights Reserved © 2025 1
,Question: 1a
4) ________ is necessary to protect the host against attacks.
A) Host hardening
B) Host bulwarking
C) Host shielding
D) None of the above - ✔✔A
Diff: 1
Question: 1b
5) If an attacker takes over a firewall, he or she will be able to ________.
A) allow connection-opening requests that violate policy
B) reroute internal data to alternate paths
C) provide the false sense that the firewall is still working correctly
D) All of the above - ✔✔D
Diff: 3
Question: 1d
Brittie Donald, All Rights Reserved © 2025 2
,6) If an attacker takes over a router, he or she will be able to ________.
A) map the entire internal network
B) reroute traffic to cause a local DoS
C) Both A and B
D) Neither A nor B - ✔✔B
Diff: 3
Question: 1e
7) Which of the following are elements of host hardening?
A) Encrypting data on the host
B) Read operating system log files
C) Both A and B
D) Neither A nor B - ✔✔C
Diff: 2
Question: 1f
8) Which of the following are elements of host hardening?
A) Minimizing applications on the host
B) Having a good border firewall
Brittie Donald, All Rights Reserved © 2025 3
, C) Both A and B
D) Neither A nor B - ✔✔A
Diff: 2
Question: 1f
9) A company should not replace default passwords during configuration. - ✔✔FALSE
Diff: 1
Question: 1g
10) ________ are sets of specific actions to be taken to harden all hosts of a particular
type and of particular versions within each type.
A) Processes
B) Security baselines
C) Procedures
D) None of the above - ✔✔B
Diff: 2
Question: 1h
Brittie Donald, All Rights Reserved © 2025 4