Module 3.3.3 Network Layer Quiz Answers Network Addressing and Basic Troubleshooting – Module 3.3.3 Network Layer Quiz Answers 1. A computer can access devices on the same network but cannot access devices on other networks. What is the probable cause of this problem? The cable is not connected …
Module 2.3.3 Data Link Layer Quiz Answers Network Addressing and Basic Troubleshooting – Module 2.3.3 Data Link Layer Quiz Answers 1. A school is adding 10 computers to a classroom. What is the most common physical network topology that is used in a classroom? bus ring star extended …
Module 1.6.3 Physical Layer Quiz Answers Network Addressing and Basic Troubleshooting – Module 1.6.3 Physical Layer Quiz Answers 1. What is an important function of the physical layer of the OSI model? It accepts frames from the physical media. It encapsulates upper layer data into frames. It defines …
Identify the Problem Probable Causes Possible Solutions An application document does not print. There is a document error in the print queue. Manage the print jobs by canceling the document from the print queue and print again. Printer cannot be added or there is a print spooler error. …
Network Defense Module 11.3.2 Evaluating Alerts Quiz Questions Exam Answers 1. What is the host-based intrusion detection tool that is integrated into Security Onion? Sguil Wireshark Snort OSSEC 2. Which tool is included with Security Onion that is used by Snort to automatically download new rules? ELK Sguil …
Network Defense Module 10.4.2 Network Security Data Quiz Questions Exam Answers 1. What is a feature of the tcpdump tool? It records metadata about packet flows. It provides real-time reporting and long-term analysis of security events. It uses agents to submit host logs to centralized management servers. It …
Network Defense Module 9.3.2 Technologies and Protocols Quiz Questions Exam Answers 1. How do cybercriminals make use of a malicious iFrame? The iFrame allows the browser to load a web page from another source. The attacker embeds malicious content in business appropriate files. The attacker redirects traffic to …
Network Defense Module 8.8.2 Module 8: Public Key Cryptography Quiz Questions Exam Answers 1. What is the purpose of the DH algorithm? to provide nonrepudiation support to support email data confidentiality to encrypt data traffic after a VPN is established to generate a shared secret between two hosts …
Network Defense Module 7.7.2 Cloud Security Quiz Questions Exam Answers 1. What are the two classes of encryption algorithms? (Choose two.) open symmetric asymmetric classic advanced 2. What term is used to describe the phenomenon of more VMs than can be managed effectively? VM Scaling VM Exhaustion VM …
Network Defense Module 6.4.2 Zone-Based Firewalls Quiz Questions Exam Answers 1. Which statement describes a feature of a zone-based policy firewall? It does not depend on ACLs. All traffic through a given interface is subject to the same inspection. It uses a flat, non-hierarchical data structure making it …