1. Which wildcard mask would permit only host 10.10.10.1? 0.0.0.0 0.0.0.31 0.0.0.255 0.0.255.255 255.255.255.255 2. Which wildcard mask would permit only hosts from the 10.10.0.0/16 network? 0.0.0.0 0.0.0.31 0.0.0.255 0.0.255.255 255.255.255.255 3. Which wildcard mask would permit all hosts? 0.0.0.0 0.0.0.31 0.0.0.255 0.0.255.255 255.255.255.255 4. Which wildcard mask …
1. What are the permit or deny statements in an ACL called? access control entries arbitrary statements content control entries control statements 2. Which packet filtering statement is true? Extended ACLs filter at Layer 3 only. Extended ACLs filter at Layer 4 only. Standard ACLs filter at Layer …
1. Which encryption method repeats an algorithm process three times and is considered very trustworthy when implemented using very short key lifetimes? Rivest Cipher Triple DES Block Cipher Data Encryption Standard Stream Cipher 2. Which encryption method encrypts plaintext one byte or one bit at a time? Rivest …
1. Which network security device ensures that internal traffic can go out and come back, but external traffic cannot initiate connections to inside hosts? VPN ASA Firewall IPS ESA/WSA AAA Server 2. Which network security device contains a secure database of who is authorized to access and manage …
1. Which attack exploits the three-way handshake? TCP reset attack UDP flood attack TCP SYN Flood attack DoS attack TCP session hijacking 2. Two hosts have established a TCP connection and are exchanging data. A threat actor sends a TCP segment with the RST bit set to both …
1. Which attack is being used when threat actors position themselves between a source and destination to transparently monitor, capture, and control the communication? Address Spoofing Attack Amplification and Reflection Attacks ICMP Attack MiTM Attack Session Hijacking 2. Which attack is being used when threat actors gain access …
1. What type of attack is tailgating? Reconnaissance Access DoS Social Engineering 2. What type of attack is a password attack? Reconnaissance Access DoS Social Engineering 3. What type of attack is port scanning? Reconnaissance Access DoS Social Engineering 4. What type of attack is man-in-the-middle? Reconnaissance Access …
1. Which malware executes arbitrary code and installs copies of itself in the memory of the infected computer? The main purpose of this malware is to automatically replicate from system to system across the network. Adware Rootkit Spyware Virus Worm 2. Which malware is non-self-replicating type of malware? …
1. Which penetration testing tool uses algorithm schemes to encode the data, which then prevents access to the data? Packet Sniffers Encryption Tools Vulnerability Exploitation Tools Forensic Tools Debuggers 2. Which penetration testing tool is used by black hats to reverse engineer binary files when writing exploits? They …
1. What term is used for a sign that a threat actor maybe be preparing to attack an asset? CSIRT precursor indicator event incident incident handling 2. What term is used for the group of people who provide incident response services to an organization? precursor indicator event incident …