Which of the following statements are true about a wireless network?
Each correct answer represents a complete solution. Choose all that apply.
#61
Answer: ABCD✅ Correct❌ Incorrect
Which of the following steps will NOT make a server fault tolerant? Each correct answer represents a complete solution. (Choose two.)
#62
Answer: BE✅ Correct❌ Incorrect
Which command list all ports available on a server?
#63
Answer: B✅ Correct❌ Incorrect
Which BC/DR activity works on the assumption that the most critical processes are brought back from a remote location first, followed by the less critical functions?
#64
Answer: B✅ Correct❌ Incorrect
Emmanuel works as a Windows system administrator at an MNC. He uses PowerShell to enforce the script execution policy. He wants to allow the execution of the scripts that are signed by a trusted publisher. Which of the following script execution policy setting this?
#65
Answer: A✅ Correct❌ Incorrect
Which of the following refers to the data that is stored or processed by RAM, CPUs, or databases?
#66
Answer: D✅ Correct❌ Incorrect
Elden is working as a network administrator at an IT company. His organization opted for a virtualization technique in which the guest OS is aware of the virtual environment in which it is running and communicates with the host machines for requesting resources. Identify the virtualization technique implemented by Elden’s organization.
#67
Answer: D✅ Correct❌ Incorrect
Which of the following steps of the OPSEC process examines each aspect of the planned operation to identify OPSEC indicators that could reveal critical information and then compare those indicators with the adversary's intelligence collection capabilities identified in the previous action?
#68
Answer: D✅ Correct❌ Incorrect
Which of the following statements are true about an IPv6 network? Each correct answer represents a complete solution. Choose all that apply.
#69
Answer: BCE✅ Correct❌ Incorrect
Which of the following IP class addresses are not allotted to hosts? Each correct answer represents a complete solution. Choose all that apply.
#70
Answer: BE✅ Correct❌ Incorrect
Which of the following is a tool that runs on the Windows OS and analyzes iptables log messages to detect port scans and other suspicious traffic?
#71
Answer: A✅ Correct❌ Incorrect
Daniel who works as a network administrator has just deployed an IDS in his organization's network. He wants to calculate the False Positive rate for his implementation. Which of the following formulas will he use, to calculate the False Positive rate?
#72
Answer: B✅ Correct❌ Incorrect
As a network administrator, you have implemented WPA2 encryption in your corporate wireless network. The WPA2's __________ integrity check mechanism provides security against a replay attack.
#73
Answer: A✅ Correct❌ Incorrect
Paul is a network security technician working on a contract for a laptop manufacturing company in Chicago. He has focused primarily on securing network devices, firewalls, and traffic traversing in and out of the network. He just finished setting up a server a gateway between the internal private network and the outside public network. This server will act as a proxy, limited amount of services, and will filter packets. What is this type of server called?
#74
Answer: C✅ Correct❌ Incorrect
Your company is planning to use an uninterruptible power supply (UPS) to avoid damage from power fluctuations. As a network administrator, you need to suggest an appropriate UPS solution suitable for specific resources or conditions. Match the type of UPS with the use and advantage:
#75
Answer: C✅ Correct❌ Incorrect
John has successfully remediated the vulnerability of an internal application that could have caused a threat to the network. He is scanning the application for the existence of a remediated vulnerability, this process is called a __________ and it has to adhere to the __________.
#76
Answer: B✅ Correct❌ Incorrect
You want to increase your network security implementing a technology that only allows certain MAC addresses in specific ports in the switches; which one of the above is the best choice?
#77
Answer: A✅ Correct❌ Incorrect
Which protocol could choose the network administrator for the wireless network design, if he need to satisfied the minimum requirement of 2.4 GHz, 22 MHz of bandwidth, 2 Mbits/s stream for data rate and use DSSS for modulation.
#78
Answer: C✅ Correct❌ Incorrect
Physical access controls help organizations monitor, record, and control access to the information assets and facility. Identify the category of physical security controls which includes security labels and warning signs.
#79
Answer: C✅ Correct❌ Incorrect
Which Internet access policy starts with all services blocked and the administrator enables safe and necessary services individually, which provides maximum security and logs everything, such as system and network activities?
#80
Answer: D✅ Correct❌ Incorrect
Which of the following attacks, the attacker cannot use the software, which is trying a number of key combinations in order to obtain your password?
#81
Answer: E✅ Correct❌ Incorrect
Which of the following router configuration modes to change the terminal settings temporarily, perform basic tests, and lists the system information?
#82
Answer: C✅ Correct❌ Incorrect
Which of the following is a worldwide organization whose mission is to create, refine and promote internet safety standards?
#83
Answer: E✅ Correct❌ Incorrect
Adam, malicious hacker, has just succeeded in stealing through a secure cookie XSS attack. He is able to play back the cookie even if the session is valid on the server. Which of the following is the most likely cause of this issue?
#84
Answer: C✅ Correct❌ Incorrect
Which of the following is a compatible network device that converts various communication protocols and are used to connect different network technologies?
#85
Answer: C✅ Correct❌ Incorrect
Who is an IR custodian?
#86
Answer: D✅ Correct❌ Incorrect
Which among the following filter is used to detect a SYN/FIN attack?
#87
Answer: C✅ Correct❌ Incorrect
Choose the correct order of steps to analyze the attack surface.
#88
Answer: D✅ Correct❌ Incorrect
Leslie, the network administrator of Livewire Technologies, has been recommending multilayer inspection firewalls to deploy the company’s infrastructure. What layers of the TCP/IP model can it protect?
#89
Answer: D✅ Correct❌ Incorrect
To provide optimum security while enabling safe/necessary services, blocking known dangerous services, and making employees accountable for their online activity, what Internet Access policy would Brian, the network administrator, have to choose?