Author: IT Administrator
1. If an asymmetric algorithm uses a public key to encrypt data, what is used to decrypt it? DH A private key A digital certificate A different public key 2. Which type of attack does the use of HMACs protect against? DoS DDoS Brute force Man-in-the-middle 3. Which …
1. With the evolution of borderless networks, which vegetable is now used to describe a defense-in-depth approach? Artichoke * Lettuce Onion Cabbage 2. What is a characteristic of a layered defense-in-depth security approach? Three or more devices are used. Routers are replaced with firewalls. When one device fails, …
1. Which technology is a proprietary SIEM system? SNMP agent Splunk * Stealthwatch NetFlow collector 2. Which term is used to describe legitimate traffic that is mistaken for unauthorized traffic by firewalls and IPSs? True positive True negative False positive * False negative 3. Which monitoring technology mirrors …
1. What type of attack uses zombies? Trojan horse SEO poisoning Spear phishing DDoS * 2. What is the best description of Trojan horse malware? It is the most easily detected form of malware. It appears as useful software but hides malicious code. * It is malware that …
1. What specialized network device is responsible for enforcing access control policies between networks? Bridge Switch Firewall IDS 2. What information does an Ethernet switch examine and use to build its address table? Source IP address Destination IP address Source MAC address Destination MAC address 3. Which device …
1. Which message does an IPv4 host use to reply when it receives a DHCPOFFER message from a DHCP server? DHCPACK DHCPREQUEST DHCPDISCOVER DHCPOFFER 2. What OSI layer is responsible for establishing a temporary communication session between two applications and ensuring that transmitted data can be reassembled in …
1. What is the outcome when a Linux administrator enters the man man command? The man man command configures the network interface with a manual address. The man man command provides documentation about the man command. * The man man command provides a list of commands available at …
1. What contains information on how hard drive partitions are organized? CPU MBR BOOTMGR Windows Registry 2. Which net command is used on a Windows PC to establish a connection to a shared directory on a remote server? net use net start net share net session 3. Which …
1. A computer is presenting a user with a screen requesting payment before the user data is allowed to be accessed by the same user. What type of malware is this? A type of virus A type of logic bomb A type of ransomware A type of worm …
This course teaches the student how to monitor and maintain complex, enterprise routed and switched IP networks. Skills learned include the planning and execution of regular network maintenance, as well as support and troubleshooting using technology-based processes and best practices, based on systematic and industry recognized approaches. Extensive …