Cybersecurity Essentials Module 6 Quiz Answers Module 6: Incident Response Quiz Question Answers 1. What describes the immediate action taken to isolate a system in the event of a breach? Containment Eradication Recovery Containment: Isolate the infected system 2. Is the following statement true or false? ‘Incident response …
Cybersecurity Essentials Module 5 Quiz Answers Module 5: Cybersecurity Operations Quiz Question Answers 1. @Apollo is running a routine audit of the server hardware in the company data center. Several servers are using single drives to host operating systems and multiple types of attached storage solutions for storing …
Cybersecurity Essentials Module 4 Quiz Answers Module 4: Defending the Enterprise Quiz Question Answers 1. What type of side-channel attacks do cybercriminals launch by studying how long it takes an embedded system to respond to different inputs? Timing attacks DoS attacks Priority inversion 2. What should you do …
Cybersecurity Essentials Module 3 Quiz Answers Module 3: System and Network Defense Quiz Question Answers 1. You are setting up a wireless network. What technology should you set up on the network to prevent man-in-the-middle attacks? Mutual authentication Biometric authentication 2. What type of lock is recommended to …
Cybersecurity Essentials Module 2 Quiz Answers Module 2: Cybersecurity P3: Principles, Practices and Processes Quiz Question Answers 1. What name is given to any changes made to original data, such as data being modified manually? (Select two answers) Backup Deletion Corruption Dissemination Integrity Modification 2. Which of the …
Cybersecurity Essentials Module 1 Quiz Answers Module 1: Cybersecurity Threats Vulnerabilities and Attacks Quiz Question Answers 1. A cybercriminal sends a series of maliciously formatted packets to a database server, which causes the server to crash. What do you call this type of attack? SQL injection DoS Man-in-the-middle …
5.4.6 Packet Tracer – Use Diagnostic Commands (Answers) Objectives Part 1: Gather End User Device Settings Part 2: Gather Information about Network Devices Part 3: Diagnose Connectivity Issues Background / Scenario In this Packet Tracer (PT) activity, you will use various commands to gather device information and troubleshoot …
4.3.9 Packet Tracer – Configure a Site-to-Site VPN (Answers) Objectives Part 1: Verify Connectivity between Branch and HQ Part 2: Create and Verify Site-to-Site VPN Background / Scenario In this Packet Tracer activity, you will add the commands required to configure a site-to-site IPsec VPN between Branch to …
3.7.2 Packet Tracer – Configure Wireless Router Hardening and Security (Answers) Objectives Part 1: Configure Basic Security Settings for a Wireless Router Part 2: Configure Wireless Router Network Security Part 3: Configure Wireless Clients Network Security Part 4: Verify Connectivity and Security Settings Background / Scenario In this …
3.5.5 Packet Tracer – Configure a Remote Access VPN Client (Answers) Objectives Part 1: Establish a Remote Access VPN Part 2: Capture and Examine Network Traffic Background / Scenario Secure communications is often required between different offices in an organization or between remote workers and the main corporate …