1. Which component of AAA is used to determine which resources a user can access and which operations the user is allowed to perform? auditing authorization authentication accounting 2. What is the biggest issue with local implementation of AAA? Local implementation cannot provide secure authentication. Local implementation supports …
1. How does BYOD change the way in which businesses implement networks? BYOD devices are more expensive than devices that are purchased by an organization. BYOD provides flexibility in where and how users can access network resources. BYOD requires organizations to purchase laptops rather than desktops. BYOD users …
1. Which action best describes a MAC address spoofing attack? flooding the LAN with excessive traffic bombarding a switch with fake source MAC addresses altering the MAC address of an attacking host to match that of a legitimate host forcing the election of a rogue root bridge 2. …
1. Users in a company have complained about network performance. After investigation, the IT staff has determined that an attacker has used a specific technique that affects the TCP three-way handshake. What is the name of this type of network attack? DNS poisoning session hijacking SYN flood DDoS …
1. What network monitoring tool can be used to copy packets moving through one port, and send those copies to another port for analysis? SPAN syslog SNMP NAC 2. What is the purpose of the Cisco NetFlow IOS technology? to collect operational data from IP networks to periodically …
1. Which is an example of social engineering? an unidentified person claiming to be a technician collecting user information from employees a computer displaying unauthorized pop-ups and adware an anonymous programmer directing a DDoS attack on a data center the infection of a computer by a virus carried …
1. What is an example of “hacktivism”? A teenager breaks into the web server of a local newspaper and posts a picture of a favorite cartoon character. A group of environmentalists launch a denial of service attack against an oil company that is responsible for a large oil …
Introduction to IoT Exam Answers Full Introduction to the Internet of Things (Version 2) Exam Answers Introduction to IoT – Chapter 1 Quiz Answers Introduction to IoT – Chapter 2 Quiz Answers Introduction to IoT – Chapter 3 Quiz Answers Introduction to IoT – Chapter 4 Quiz Answers …
6.1.2.6 Lab – IoT Related Job and Learning Opportunities Answers Objectives The purpose of this lab is to explore job and learning opportunities in the ever-evolving world of the internet of Things. Part 1: Identify three IoT related jobs that interest you. Part 2: Research the available job …
5.1.3.6 Lab – Discover Your Own Risky Online Behavior Answers Objectives Explore actions performed online that may compromise your safety or privacy. Background / Scenario The Internet is a hostile environment, and you must be vigilant to ensure your data is not compromised. Attackers are creative and will …