Which of the following TCP/IP state transitions represents no connection state at all?
#91
Answer: A✅ Correct❌ Incorrect
What is the range for private ports?
#92
Answer: A✅ Correct❌ Incorrect
Which of the following layers provides communication session management between host computers?
#93
Answer: C✅ Correct❌ Incorrect
Which of the following cables is made of glass or plastic and transmits signals in the form of light?
#94
Answer: D✅ Correct❌ Incorrect
Which of the following is a presentation layer protocol?
#95
Answer: B✅ Correct❌ Incorrect
Identify the spread spectrum technique that multiplies the original data signal with a pseudo random noise spreading code.
#96
Answer: C✅ Correct❌ Incorrect
Katie has implemented the RAID level that splits data into blocks and evenly writes the data to multiple hard drives but does not provide data redundancy. This type of RAID level requires a minimum of __________ in order to setup.
#97
Answer: A✅ Correct❌ Incorrect
The agency Jacob works for stores and transmits vast amounts of sensitive government data that cannot be compromised. Jacob has implemented Encapsulating
Security Payload (ESP) to encrypt IP traffic. Jacob wants to encrypt the IP traffic by inserting the ESP header in the IP datagram before the transport layer protocol header. What mode of ESP does Jacob need to use to encrypt the IP traffic?
#98
Answer: B✅ Correct❌ Incorrect
Which of the Windows security component is responsible for controlling access of a user to Windows resources?
#99
Answer: C✅ Correct❌ Incorrect
Which of the following helps in viewing account activity and events for supported services made by AWS?
#100
Answer: D✅ Correct❌ Incorrect
James is a network administrator working at a student loan company in Minnesota. This company processes over 20,000 student loans a year from colleges all over the state. Most communication between the company, schools, and lenders is carried out through emails. Much of the email communication used at his company contains sensitive information such as social security numbers. For this reason, James wants to utilize email encryption. Since a server-based PKI is not an option for him, he is looking for a low/no cost solution to encrypt emails. What should James use?
#101
Answer: C✅ Correct❌ Incorrect
David is working in a mid-sized IT company. Management asks him to suggest a framework that can be used effectively to align the IT goals to the business goals of the company. David suggests the _________ framework, as it provides a set of controls over IT and consolidates them to form a framework.
#102
Answer: A✅ Correct❌ Incorrect
Which of the following layers of TCP/IP model is used to move packets between the Internet Layer interfaces of two different hosts on the same link?
#103
Answer: C✅ Correct❌ Incorrect
John, the network administrator and he wants to enable the NetFlow feature in Cisco routers to collect and monitor the IP network traffic passing through the router. Which command will John use to enable NetFlow on an interface?
#104
Answer: B✅ Correct❌ Incorrect
Which of the following types of information can be obtained through network sniffing? (Choose all that apply.)
#105
Answer: ABD✅ Correct❌ Incorrect
Which among the following is used by anti-malware systems and threat intelligence platforms to spot and stop malicious activities at an initial stage?
#106
Answer: D✅ Correct❌ Incorrect
Which risk management phase helps in establishing context and quantifying risks?
#107
Answer: B✅ Correct❌ Incorrect
Which firewall technology can be implemented in all (application, session, transport, network, and presentation) layers of the OSI model?
#108
Answer: C✅ Correct❌ Incorrect
Michelle is a network security administrator working at a multinational company. She wants to provide secure access to corporate data (documents, spreadsheets, email, schedules, presentations, and other enterprise data) on mobile devices across organizations networks without being slowed down and also wants to enable easy and secure sharing of information between devices within an enterprise. Based on the above-mentioned requirements, which among the following solution should Michelle implement?
#109
Answer: B✅ Correct❌ Incorrect
Which of the following is a Windows in-built feature that provides filesystem-level encryption in the OS (starting from Windows 2000), except the Home version of Windows?
#110
Answer: A✅ Correct❌ Incorrect
John wants to implement a packet filtering firewall in his organization's network. What TCP/IP layer does a packet filtering firewall work on?
#111
Answer: C✅ Correct❌ Incorrect
Andrew would like to configure IPsec in a manner that provides confidentiality for the content of packets. What component of IPsec provides this capability?
#112
Answer: B✅ Correct❌ Incorrect
A newly joined network administrator wants to assess the organization against possible risk. He notices the organization doesn't have a __________ identified which helps measure how risky an activity is.
#113
Answer: D✅ Correct❌ Incorrect
Chris is a senior network administrator. Chris wants to measure the Key Risk Indicator (KRI) to assess the organization. Why is Chris calculating the KRI for his organization? It helps Chris to:
#114
Answer: A✅ Correct❌ Incorrect
Which Event Correlation Approach checks and compares all the fields systematically and intentionally for positive and negative correlation with each other to determine the correlation across one or multiple fields?
#115
Answer: D✅ Correct❌ Incorrect
Management wants to bring their organization into compliance with the ISO standard for information security risk management. Which ISO standard will management decide to implement?
#116
Answer: A✅ Correct❌ Incorrect
Which of the following systems includes an independent NAS Head and multiple storage arrays?
#117
Answer: C✅ Correct❌ Incorrect
You are monitoring your network traffic with the Wireshark utility and noticed that your network is experiencing a large amount of traffic from a certain region. You suspect a DoS incident on the network. What will be your first reaction as a first responder?
#118
Answer: A✅ Correct❌ Incorrect
If a network is at risk resulting from misconfiguration performed by unskilled and/or unqualified individuals, what type of threat is this?
#119
Answer: D✅ Correct❌ Incorrect
Which of the following acts as a verifier for the certificate authority?