1. A host is transmitting a broadcast. Which host or hosts will receive it? a specially defined group of hosts all hosts in the same network all hosts on the Internet the closest neighbor on the same network 2. Which statement describes a characteristic of cloud computing? A …
1. Which type of tool is used by a Linux administrator to attack a computer or network to find vulnerabilities? intrusion detection system malware analysis PenTesting firewall 2. What is a benefit of Linux being an open source operating system? Linux distribution source code can be modified and …
1. When a user makes changes to the settings of a Windows system, where are these changes stored? win.ini boot.ini Registry Control Panel 2. Which user account should be used only to perform system management and not as the account for regular use? standard user administrator power user …
1. Which personnel in a SOC is assigned the task of verifying whether an alert triggered by monitoring software represents a true security incident? Tier 3 personnel SOC Manager Tier 2 personnel Tier 1 personnel 2. After a security incident is verified in a SOC, an incident responder …
1.4.2 Module 1: The Danger Quiz Answers 1. An attacker sends a piece of malware as an email attachment to employees in a company. What is one probable purpose of the attack? probing open ports on the firewall on the border network searching and obtaining trade secrets cracking …
1.8.3 Check Your Understanding – Network Security 1. Which attack slows down or crashes equipment and programs? Firewall Virus, worm, or Trojan horse Zero-day or Zero-hour Virtual Private Network (VPN) Denial of Service (DoS) 2. Which option creates a secure connection for remote workers? Firewall Virus, worm, or …
1.7.10 Check Your Understanding – Network Trends 1. Which feature is a good conferencing tool to use with others who are located elsewhere in your city, or even in another country? BYOD Video communications Cloud computing 2. Which feature describes using personal tools to access information and communicate …
1.6.6 Check Your Understanding – Reliable Networks 1. When designers follow accepted standards and protocols, which of the four basic characteristics of network architecture is achieved? fault tolerance Scalability QoS Security 2. Confidentiality, integrity, and availability are requirements of which of the four basic characteristics of network architecture? …
1.4.5 Check Your Understanding – Common Types of Networks 1. Which network infrastructure provides access to users and end devices in a small geographical area, which is typically a network in a department in an enterprise, a home, or small business? Extranet Intranet LAN WAN 2. Which network …
1.3.3 Check Your Understanding – Network Representations and Topologies 1. Which connection physically connects the end device to the network? Port NIC Interface 2. Which connections are specialized ports on a networking device that connect to individual networks? Port NIC Interface 3. Which type of network topology lets …