AND SECURITY FOUNDATIONS WITH
COMPLETE SOLUTIONS
A ______ is a device that connects two or more packet-switched networks or
subnetworks. It serves two primary functions: managing traffic between these networks
by forwarding data packets to their intended IP addresses, and allowing multiple
devices to use the same internet connection. - ANSWER-Router
A _______ attack send TCP/IP traffic to each and every port to learn which services are
running.
Spoofing
Port scanning
Ping flood
SQL Injection - ANSWER-Port Scanning
A bridge _________________________________________________
a. connects wireless devices to the network using AES
b. connects storage systems using IP based connections
c. connects two networks by forwarding traffic without analysis for which host receives
the data
d. provides a direct connection to devices on the same network - ANSWER-c. connects
two networks by forwarding traffic without analysis for which host receives the data
A company has the policy that all new user passwords are P@ssw0rd but does not
require new users to change their password. An employee randomly tries a coworker's
account with the new user password to see if they can log in as the coworker. Which
type of vulnerability does this create?
a. BYOD
b. Weak password
c. Default password
d. Misconfigured firewall rules - ANSWER-Default password
A company is concerned with traffic that flows through the network. There is a concern
that there may be malware that exists that is not being blocked or eradicated by
antivirus. What technology can be put in place to detect potential malware traffic on the
network?
IDS
firewall
Honeypot
NAC - ANSWER-IDS
,A company needs to secure the network using a security system that can inspect the
network traffic's payload to prevent attacks. What type of firewall would you
recommend?
Application Firewall
Stateful Firewall
Packet Filtering
Layer 3 or 4 Firewall - ANSWER-Application Firewall
A company provides access to employees' tax and personal information via a public-
facing web portal. What should the company implement to encrypt employees' web
access to this information?
a. Transport layer security (TLS)
b. Network intrusion detection system (NIDS)
c. Advanced encryption standard (AES)
d. Two-factor authentication (2FA) - ANSWER-a. Transport layer security (TLS)
A cybersecurity specialist is asked to identify the potential criminals known to attack the
organization. Which type of hackers would the cybersecurity specialist be least
concerned with?
Gray hat hackers
Black hat hackers
Script kiddies
White hat hackers - ANSWER-White hat hackers
A hub is the device of choice to decrease traffic on a network segment.
True
False - ANSWER-False
A malicious user was able to lock a user's account after guessing the user's password
multiple times unsuccessfully.
Which category of the CIA triad did the malicious user target in this attack?
a. Confidentiality
b. Integrity
c. Availability
d. Accessibility - ANSWER-c. Availability
A malicious user was able to perform a password brute force attack on a human
resource email account and is now reading through all their emails. Which category of
the CIA triad was compromised?
,Authentication
Confidentiality
Availability
Integrity - ANSWER-Confidentiality
A network admin is configuring an application and needs to be sure that port 4432 is
open what tool should the admin use?
Ping
netstat
nmap
TCP_Function - ANSWER-nmap (Network Mapper)
It is an open-source Linux command-line tool that is used to scan IP addresses and
ports in a network and to detect installed applications.
A router is a Layer 3 device.
True
False - ANSWER-True
A stateful firewall uses Stateful Packet Inspection to protect the network. How does this
type of firewall operate?
a. A stateful firewall uses a list to allow connections
b. A stateful firewall makes requests on behalf of other systems on a Network
c. A stateful firewall that compares all inbound traffic to ensure there is an outbound
request.
d. A stateful firewall that compares IP addresses to a block list to deny connections -
ANSWER-c. A stateful firewall that compares all inbound traffic to ensure there is an
outbound request.
A switch forwards data only to the port that are connected to the destination device. It
knows which port to forward it to based on which value?*
Conf value
IP address
Port Number
MAC Address - ANSWER-MAC Address
A switch is a Layer 1 device and unlike a hub it creates a direct connection to devices
on the network.
True
False - ANSWER-False
, A third world country has solicited the services of several hackers to perform an attack
on the U.S. treasury department? Which time of attack would this be classified as?
Nation State Espionage
Industrial Espionage
International Espionage
World Espionage - ANSWER-Nation State Espionage
A user is mistakenly granted access to customer accounts not required for his duties.
Which component of the AAA model is violated?
a. Authentication
b. Authorization
c. Availability
d. Access - ANSWER-b. Authorization
A user is setting up his new work account and sets his password to password01 so he
can easily remember it. What type of vulnerability did his password choice create?
Default password
Brute-force
Zero-day
Weak password - ANSWER-Weak password
A user is upset that he has just been fired and decides to perform a ping flood attack on
the email server. What type of attacker would this user be considered?
Wiretapping
Social engineering
Password attack
Insider threat - ANSWER-Insider threat
A user is working on a home computer when another user seems to open an application
to view documents on the same computer. The user immediately suspects that a back
door into the computer exists.Which action should be taken first to deal with the
problem?
a. Close the application the remote user opened
b. Begin running antivirus scans
c. Unplug the PC's network connection
d. Open task manager to determine which applications are running - ANSWER-c.
Unplug the PC's network connection
A user on a network is planning to launch an exploit against a coworker in a neighboring
department. The user needs to identify the IP address of a coworker in the desired