Author: ITExamAnswers
1. A host is transmitting a broadcast. Which host or hosts will receive it? a specially defined group of hosts all hosts in the same network all hosts on the Internet the closest neighbor on the same network 2. Which statement describes a characteristic of cloud computing? A …
1. Which type of tool is used by a Linux administrator to attack a computer or network to find vulnerabilities? intrusion detection system malware analysis PenTesting firewall 2. What is a benefit of Linux being an open source operating system? Linux distribution source code can be modified and …
1. When a user makes changes to the settings of a Windows system, where are these changes stored? win.ini boot.ini Registry Control Panel 2. Which user account should be used only to perform system management and not as the account for regular use? standard user administrator power user …
1. Which personnel in a SOC is assigned the task of verifying whether an alert triggered by monitoring software represents a true security incident? Tier 3 personnel SOC Manager Tier 2 personnel Tier 1 personnel 2. After a security incident is verified in a SOC, an incident responder …
1.4.2 Module 1: The Danger Quiz Answers 1. An attacker sends a piece of malware as an email attachment to employees in a company. What is one probable purpose of the attack? probing open ports on the firewall on the border network searching and obtaining trade secrets cracking …
1.1.2.4 Lab – Mapping the Internet Answers Objectives Part 1: Test Network Connectivity Using Ping Part 2: Trace a Route to a Remote Server Using Windows Tracert Part 3: Trace a Route to a Remote Server Using Web-Based and Software Tools Part 4: Compare Traceroute Results Background Route …
1.1.1.2 Lab – How Connected are You? Answers Objectives Survey 3 or 4 people: family, colleagues, and friends. Determine how many hours they are “connected” via any device during each day. Background / Scenario It is important to understand that most people born in the 1990s, will have …
10.6.13 Packet Tracer – Research and Execute Password Recovery Procedures – Physical Mode Answers Objectives Part 1: Research the Configuration Register Part 2: Document the Password Recovery Procedure for a Specific Cisco Router Background / Scenario The purpose of this activity is to research the procedure for recovering …
10.6.12 Packet Tracer – Use TFTP and Flash to Manage Configuration Files – Physical Mode Answers Topology Addressing Table Device Interface IP Address Subnet Mask Default Gateway R1 G0/0/1 192.168.1.1 255.255.255.0 N/A S1 VLAN 1 192.168.1.11 255.255.255.0 192.168.1.1 Server1 F0 192.168.1.3 255.255.255.0 192.168.1.1 Objectives Part 1: Cable the …
5.5.2 Packet Tracer – Configure and Verify Extended IPv4 ACLs – Physical Mode Answers Topology Addressing Table Device Interface IP Address Subnet Mask Default Gateway R1 G0/0/1 N/A N/A N/A G0/0/1.20 10.20.0.1 255.255.255.0 G0/0/1.30 10.30.0.1 255.255.255.0 G0/0/1.40 10.40.0.1 255.255.255.0 G0/0/1.1000 N/A N/A G0/0/0 172.16.1.1 255.255.255.0 R2 G0/0/1 10.20.0.4 …