– FOUNDATIONS STUDY GUIDE
QUESTIONS WITH ACCURATE
CONPLETE SOLUTIONS | GRADED
A+ | SURE TO PASS – JUST
RELEASED
1. An office's infrastructure connects network devices and
printers through a central access point without the use
of cabling. Which network type does this office use?
a. WLAN
b. WAN
c. CAN
d. SAN - ANSWER ✓ WLAN
2. Which type of attack send emails claiming to be your
bank and asking you to verify that your username and
password are correct?
, Dictionary attack
Phishing
Brute force attack
Man-in-the-middle - ANSWER ✓ Phishing
3. Who uses Nessus software to san servers and network
devices for known vulnerabilities.
Script Kiddies
Insider threats
Vulnerability testers
Black hat hackers - ANSWER ✓ Vulnerability testers
4. Which attack allows an attacker to take control of a
database by inserting special commands into input
boxes instead the intended data? - ANSWER ✓ SQL
Injection
5. What type of attack is it when the attacker discovers a
software vulnerability that does not have a patch? -
ANSWER ✓ Zero-day
,6. What phrase represents Authentication best?
7. Do you do what you say you will do?
Are you credentialed for the level of access you need?
Did you arrive at the time you said you did?
Are you who you say you are? - ANSWER ✓ Are you
who you say you are?
8. ARP Poisoning allows an attacker to:
Eavesdrop on the traffic sent through the Hub
Eavesdrop on the traffic sent through the Switch
Eavesdrop on the traffic sent through the Router
Eavesdrop on the traffic sent through the Firewall -
ANSWER ✓ Eavesdrop on the traffic sent through the
Switch
9. What does AAA stand for?
Authorization, Access and Accounting
Authentication, Access and Autoscaling
Authentication, Authorization and Accounting
, Access, Authorization and Authentication - ANSWER
✓ Authentication, Authorization and Accounting
10. What is the best choice that describes the difference
between IDS and IPS?
a. IPS can only detect intrusions and IDS can detect
and stop malicious network attacks.
b. IDS can detect intrusions and IDS can stop
malicious network attacks.
c. IDS is only used for webservers; IPS can be used
in all environments
d. IDS can detect intrusions; IPS can stop malicious
network attacks. - ANSWER ✓ d. IDS can detect
intrusions; IPS can stop malicious network
attacks.
11. What are two types of encryption?
a. Symmetric encryption, the same key encrypts
and decrypts data; asymmetric encryption
different keys encrypt and decrypt data