1. What are the two most commonly referenced fields in an IPv4 packet header that indicate where the packet is coming from and where it is going? (Choose two.) destination IP address protocol Time to Live source IP address Differentiated Services (DS) 2. Which statement is correct about …
1. Which OSI layer sends segments to be encapsulated in an IPv4 or IPv6 packet? data link layer network layer transport layer session layer 2. Which layer is responsible for taking an IP packet and preparing it for transmission over the communications medium? physical layer network layer data …
1. Which Ethernet frame field assists a host in determining if the frame that is received is addressed to it? source address preamble destination address frame check sequence 2. Which Ethernet frame field notifies destinations to get ready for a new frame? preamble type destination address frame check …
1. What is the process of dividing a large data stream into smaller pieces prior to transmission? sequencing duplexing multiplexing segmentation 2. What is the PDU associated with the transport layer? segment packet bits frame 3. Which protocol stack layer encapsulates data into frames? data link transport network …
1. Which Windows tool selectively denies traffic to a computer or network segment? Event Viewer Resource Monitor Task manager Windows Defender Windows Defender Firewall Windows Registry 2. Which Windows tool logs history, application, security, and system events? Event Viewer Resource Monitor Task manager Windows Defender Windows Firewall Windows …
1. Which Windows registry hive stores information about object linking and embedding (OLE) registrations? HKEY_CLASSES_ROOT (HKCR) HKEY_CURRENT_CONFIG (HKCC) HKEY_CURRENT_USER (HKCU) HKEY_LOCAL_MACHINE (HKLM) HKEY_USERS (HKU) 2. Which Windows registry hive stores information about the current hardware profile? HKEY_CLASSES_ROOT (HKCR) HKEY_CURRENT_CONFIG (HKCC) HKEY_CURRENT_USER (HKCU) HKEY_LOCAL_MACHINE (HKLM) HKEY_USERS (HKU) 3. Which …
1. Which SOC job role manages all the resources of the SOC and serves as a point of contact for the larger organization or customer? SME/Threat Hunter SOC Manager Cybersecurity Analyst Incident Responder 2. Which SOC job role processes security alerts and forwards tickets to Tier 2 if …
1. Which security term is used to describe anything of value to the organization? It includes people, equipment, resources, and data. Vulnerability Exploit Asset Risk 2. Which security term is used to describe a weakness in a system, or its design, that could be exploited by a threat? …
1. True or False? In the router ospf process-id command, the process ID value, which can any number between 1 and 65,535, is locally significant. It must be the same on all routers in the OSPF area. True False 2. Which of the following applies to the router …
1. During this OSPF state on multiaccess networks, the routers elect a Designated Router (DR) and a Backup Designated Router (BDR). Down State Init State Two-Way State ExStart State Exchange State Loading State Full State 2. During this OSPF state, routers send each other DBD packets. Down State …